What are drawbacks of electronic data interchange processes, Computer Engineering

Assignment Help:

What are the drawbacks of Electronic Data Interchange processes?

Disadvantages of EDI processes are given below:

1. The X12 standard is so huge and general

2. Electronic Data Interchange communications negotiate a technical agreement to explain exactly what subset of EDI they will employ

3. EDI variants explain some optional EDI tools as mandatory and others as forbidden identify additional inter-component restrictions, specify a subset of codes in used code sets which will be accepted and used, might add additional codes, and limit the transaction sets which will be used.

4. The lack of semantic rigor within the meanings of different tools of EDI messages

5. Without being semantically-enabled, Electronic Data Interchange messages are unable to be interfaced along with Semantic Web Services

6. EDI is more expensive: several companies are only doing business along with others who use Electronic Data Interchange. When a company wants to do business along with three organizations, they should implement an EDI program. That expense may be very costly for small companies.


Related Discussions:- What are drawbacks of electronic data interchange processes

Database, how create database design for pharmacy by diagram and query

how create database design for pharmacy by diagram and query

Discuss the important characteristics of 8237, Question 1 Discuss the w...

Question 1 Discuss the working principle of an interrupt and hardware actions in interrupt handling 2 Discuss the important characteristics of 8237 3 Describe the format

Explain the terms topology used in lans, Explain the terms topology used in...

Explain the terms topology used in LANs. (i) LAN topologies: This network topology is a physical schematic that shows interconnection of the several users. There are four fun

State the relative addressing, State the Relative addressing The locati...

State the Relative addressing The location of data is specified relative to current value of the program counter. This is helpful for specifying location of data which is given

Security, We now consider the relation between passwords and key size. For ...

We now consider the relation between passwords and key size. For this purpose consider a cryptosystem where the user enters a key in the form of a password. Assume a password consi

Simplify using k-map, Q. Simplify Using K-Map 1. M2 + M3 + M5 + M7 + M1...

Q. Simplify Using K-Map 1. M2 + M3 + M5 + M7 + M12 + M13 + M8 + M9 2. M0 + M2 + M4 + M5 + M8 + M10 + M12 3. F(W,X,Y,Z) = ∑ (0,1,2,4,5,6,8,9,12,13,14)

Define lazy swapper, Define lazy swapper.  Rather than swapping the who...

Define lazy swapper.  Rather than swapping the whole process into main memory, a lazy swapper is used. A lazy swapper never swaps a page into memory unless that page will be re

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd