• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

What Electronic Data Interchange (EDI) is (conventional and internet based) and share with you some of the benefits and downfalls of operating such a system. Some

Extracts from this document...

Introduction

Introduction I will expand on what Electronic Data Interchange (EDI) is (conventional and internet based) and share with you some of the benefits and downfalls of operating such a system. Some of the benefits are lower costs, improved accuracy, and decreased paper output and processing time. One main downfall is the initial cost of the implementation of the system. I will also give you an example of how a company uses this technology. Electronic Data Interchange (EDI) as defined by Roger Clarke: "the exchange of documents in standardized electronic form, between organizations, in an automated manner, directly from a computer application in one organization to an application in another." EDI has been around for several decades and it has been the primary method of conducting electronic business-to-business commerce. It contains the same information that would be found on paper documents used for the same function within an organization. The following are elements of EDI: * Electronic transmission medium (VAN or the Internet) is used rather than the dispatch of physical storage media such as magnetic tapes and disks. ...read more.

Middle

Compatibility with new applications is difficult because of the complexity of the X12 formats. As a result of the compatibility the process of transferring large batches of data are delayed, which is at odds with today's real-time world. Also, the cost of transmitting data through VANs is very costly at $25 per 1,000 characters, but today costs are getting lower. Because conventional EDI is so rigid, costly and time consuming to initiate, it is only cost-effective for very large companies. For these reasons it keeps the number of EDI participants relatively very low. EDI via the Internet The internet was once thought to be the end of EDI, but instead it has given EDI users new options. EDI via the internet is basically the same as conventional EDI with the exception of how the information is transmitted. EDI transactions can now be sent over the internet instead of sending X12 forms back and forth via VANs. Software products put transactions into encrypted envelopes and then electronically seal them so that only authorized parties with the encryption key can view the contents. ...read more.

Conclusion

The full potential of an EDI system can be best utilized if it is integrated with other applications such as inventory control, shipping, accounts payable and production planning. Unfortunately, suppliers are forced to use the sometimes costly EDI system in order to continue a business relationship with the larger companies. This is not always as cost-effective for suppliers as it is for the larger companies. Summary EDI saves time because it is faster at transmitting data, delivers data with the utmost accuracy, cuts down on paper usage and decreases overall time by eliminating re-keying of information. It is a more stream-lined business process for both trading parties. Benefits can be obtained in areas like administration, inventory management, distribution, and cash management. EDI has its share of problems, but its benefits far exceed them. With the internet it is becoming easier for trading partners to transmit data at a much greater reduced cost to both parties. The next few years hold great promise for EDI and the internet. Existing EDI forms can be kept by trading partners and new ways of transmitting data can be found cheaper, which will enable more new partners. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Marked by a teacher

    Designing a data system for a vintage clothes business.

    3 star(s)

    description about product She does this for many products if need be Lastly a New Design: Luki draws new design Scans drawing to computer Makes small edits on Photoshop Then contacts manufacturer to let them know X amount of designs for X amount of products needed 2.1.3.

  2. LAN & WAN Protocols

    This works at the network layer. It contains packetization which is data from the upper layer control encapsulated inside another packet or more packets or more datagram's. A control setup circuit is not required in order for a host to send packets to a host which it has not previously communicated with.

  1. Comparing Operating Systems

    These programmes are known as "viruses", which like the clinical virus, avoid detection by changing form and then when the opportunity allows, do their bit of destruction. Windows uses the protocol TCP/IP to communicate with other computers. It is also the protocol that is used for communicating with the internet.

  2. Smart Card System

    divisible by (p-1)(q-1). We define E_K(P) = P^e mod pq, D_K(C) = C^d mod pq. All quantities are readily computed from classic and modern number theoretic algorithms (Euclid's algorithm for computing the greatest common divisor yields an algorithm for

  1. importance of data security and data safety

    * Describe the role of email when using internet communications. You can send email to an individual or to a group of people at the same time, you can create mailing list so that you can write a message and send it automatically to number of people.

  2. Flexible Architectures in Communication Security Application

    Secret-key ciphers have the advantage of running as much as 1000 times faster than comparable public-key ciphers [30]. To maximize security and performance, most secure protocols use both forms of cryptography. Public key encryption is used at the start of a session to authenticate communicating parties and to securely distribute a shared secret key.

  1. CP3 - Proposed Solution to a Realistic Problem - Apartment Administration software

    My client can save time by emailing the customer invoices, this means they do not have to post letters using mail, but can send them as attachments which is cheaper and faster. * Spreadsheets - Spreadsheets are a good way to statistically analyse data.

  2. Bytecode Engineering

    You can use these methods to set any of the class components to new values. They're not generally of much direct use, though, because the other classes in the package don't provide support for constructing new versions of the components in any reasonable manner.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work