What are drawbacks of electronic data interchange processes, Computer Engineering

Assignment Help:

What are the drawbacks of Electronic Data Interchange processes?

Disadvantages of EDI processes are given below:

1. The X12 standard is so huge and general

2. Electronic Data Interchange communications negotiate a technical agreement to explain exactly what subset of EDI they will employ

3. EDI variants explain some optional EDI tools as mandatory and others as forbidden identify additional inter-component restrictions, specify a subset of codes in used code sets which will be accepted and used, might add additional codes, and limit the transaction sets which will be used.

4. The lack of semantic rigor within the meanings of different tools of EDI messages

5. Without being semantically-enabled, Electronic Data Interchange messages are unable to be interfaced along with Semantic Web Services

6. EDI is more expensive: several companies are only doing business along with others who use Electronic Data Interchange. When a company wants to do business along with three organizations, they should implement an EDI program. That expense may be very costly for small companies.


Related Discussions:- What are drawbacks of electronic data interchange processes

Internet programming, Futoshiki is a game played on an N by N (usually 5 by...

Futoshiki is a game played on an N by N (usually 5 by 5) grid and uses the symbols 1 .. N. The objective of the game is to place each symbol on the grid so that it only occurs once

How many types of memory in computer architecture, Computer have many type ...

Computer have many type of memory like primary memory , Auxiliary memory ,  Cache memory , buffer memory ,virtual memory , The work of all memory heterogeneously primary memory

Explain the outsourcing barriers that an organization faces, Explain the ou...

Explain the outsourcing barriers that an organization faces. 1. Critical operations that cannot be outsourced. 2. Negative customer reaction. 3. Employee resistance. 4

Explain the term- hacking, Explain the term- Hacking    Use of passwor...

Explain the term- Hacking    Use of passwords and ids to prevent illegal access to files. Also locking the computer itself or locking computer room can help here. Encryption s

What are the characteristics of dram, What are the characteristics of DRAM?...

What are the characteristics of DRAM? Low cost High density Refresh circuitry is needed

Explain the client- server interface using procedures, Explain the Client- ...

Explain the Client- Server Interface Using Procedures Developers must realize that client-server impose a division of labor in application programs. Programs must be broken up

Cemistry, Discuss scales and sludge

Discuss scales and sludge

Hypothetical reliable data transfer protocol, the c code for hypothetical r...

the c code for hypothetical reliable data transfer protocol

What is public key cryptography, What is Public Key Cryptography? Pub...

What is Public Key Cryptography? Public-key cryptography is a type of modern cryptography that allows users to communicate safely without any previously agreeing on a shared

Is it possible to create graph form spreadsheets, Is it possible to create ...

Is it possible to create graph form spreadsheets For example IF G5 > 100 THEN "Y" ELSE "N" -  It's also possible to create graphs and charts from spreadsheets (such as using

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd