Simple b2b connectivity using punchout, Other Subject

Assignment Help:

Simple B2B Connectivity Using Punchout

Now, let's focus on two of the B2B connectivity problems previously mentioned, and illustrated in Figure 1.5. First, let's discuss the supplier connectivity problem and present a solution based on IBM's WCBE for connectivity of suppliers to diverse procurement systems. Second, a discussion of marketplace connectivity takes place, as well as a presentation of a solution based on IBM's Web Sphere Commerce Suite and Marketplace Edition (WCS MPE) for connectivity of marketplaces to diverse procurement systems and diverse supplier systems.

Most procurement systems and private marketplaces support the notion of punch-out (albeit sometimes using a different term, such as Roundtrip, used by Commerce One). A buyer at a procurement system or marketplace selects a remote supplier, and the buyer is automatically logged on to the supplier catalog server and presented with a catalog customized for his organization, with renegotiated prices. The buyer shops at the site, as the items selected for purchase are being stored in a shopping cart. On checkout, the shopping cart contents are sent back to the buyer's procurement system for agreement. The procurement system provides workflow for approvals and, on approval, a purchase order is sent from the procurement system to the supplier. Further messages may be exchanged between the supplier and the procurement system, such as shipping notices and invoices. By having punch-out ability, marketplaces and suppliers can interoperate with procurement systems or marketplaces, with significant profit to both buyers and suppliers.

For instance, IBM's WCBE is a key for the business-to-consumer trade, while WCS MPE supports the private trading exchange customers. Customers can hook up to the WCBE Web site, browse via the catalog, and place orders. In the case of WCS MPE, customers have the advantage of working with a variety of trading mechanisms, such as ask for reverse auctions, quotations (RFQs), auctions, and exchanges. It is particularly useful, given the rising trends in the industry, that the Web Sphere Commerce products have punch-out ability and can interoperate with buyers' procurement marketplaces and systems.

Though WCS MPE supports aggregation of suppliers' catalogs, certain suppliers may have huge catalogs and their systems may consist of complex configuration tools. Frequently, it is not sufficient to offload supplier catalogs into outside marketplaces. Thus, suppliers often have their supply-side Web sites enabled for punch-out, and expect WCS MPE to start punch-out to the supplier Web site.

Catalog aggregation in the current WCS MPE product is completed using the Web Sphere Catalog Manager (WCM) product. WCM supports the loading of catalog data into an electronic marketplace (EMP) database, transforming catalog data fromASCII, spreadsheet, and XML formats into a canonical XML format, and extracting catalog data from any relational database. Additional enhancements to carry industrial catalogs are designed for future versions of WCM.

Many huge corporations have comparatively independent subsidiaries and are standard examples of customers that need support for both receiving punch-out requests and initiating punch-out requests. Such corporations often have aggregated supplier catalogs across their subsidiaries, so their customers observe a unified company-wide catalog and necessitate support for receiving punch-out requests from the buyers' procurement systems to the aggregated catalog. They also necessitate punch-out initiation functionality to connect from their aggregated- catalog server to individual catalogs supported by their subsidiaries.


Related Discussions:- Simple b2b connectivity using punchout

Global Studies Question, How did Southeast Asians react to contact with ma...

How did Southeast Asians react to contact with many different religions?

Bogus clients, Question: a) Explain the 10 warning signs which woul...

Question: a) Explain the 10 warning signs which would indicate that attraction feelings towards clients may be putting you or your services at risk. b) What precautions

Security model, SECURIT Y MODEL A computer security model is a system ...

SECURIT Y MODEL A computer security model is a system for identifying and enforcing security policies. A security model may be established upon a formal model of access rights

Macros, Do you have experts writing macros in excel?

Do you have experts writing macros in excel?

Prehistoric archaeology, Questions: I need a report on Prehistoric archaeo...

Questions: I need a report on Prehistoric archaeology. I want to know their types, Prehistoric archaeology report for about 2500 words? Would you able to assist me in report? Let

Information systems project management , "virtual team success in project m...

"virtual team success in project management" please follow the assignment sheet its very simple assignment...all the articles from only Information Systems (IS) journals...we do no

Need of privatization of public sector undertakings, Q. Why Privatization o...

Q. Why Privatization of Public Sector Undertakings are requied? The private sector was allowed to set up business with government control over their functioning. There was howe

Visual cryptography, i need matlab coding for extracting common pixels fro...

i need matlab coding for extracting common pixels from images

Give me liberty, The textbook states, “Prejudice by itself did not create A...

The textbook states, “Prejudice by itself did not create American slavery.” Examine the forces and events that led to slavery in North America, and the role that racial prejudice p

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd