Electronic Data Interchange is a technique for computer to computer exchange of business documents in a standard electronic format between business partners or companies. Companies use EDI systems for exchanging business information automatically by computer systems as transactions without paper and hence minimizes or completely eliminates the human intervention. Electronic data interchange is generally used for B2B transactions.
Common EDI documents:
- Shipping requests
- Purchase order
Both the enterprises have EDI applications installed in their systems. Enterprise 1 uses its EDI application to generate an EDI document that it want to share with the other enterprise. The format of this EDI document must be the standard format that has been decided by the two enterprises for sharing EDI documents during their deals. This document is shared with the other enterprise over the network. The document is received by the Enterprise 2 in the standard format on the EDI application. This is how the two enterprises exchanges business documents electronically and minimizes or eliminates the human interventions.
- As it is direct computer to computer transaction system, it is high speed.
- Due to reduced human intervention, it is very accurate.
- Simple to use.
- Highly secure.
- Reduction in paper work.
- Cost effective.
Attention reader! Don’t stop learning now. Get hold of all the important CS Theory concepts for SDE interviews with the CS Theory Course at a student-friendly price and become industry ready.
- Secure Electronic Transaction (SET) Protocol
- Difference between Secure Socket Layer (SSL) and Secure Electronic Transaction (SET)
- EDRM - Electronic Discovery Reference Model
- Difference between Data Privacy and Data Security
- Difference between Data Privacy and Data Protection
- Maximum Data Rate (channel capacity) for Noiseless and Noisy channels
- Data Compression With Arithmetic Coding
- Framing in Data Link Layer
- Synchronous Data Link Control (SDLC) Loop Operation
- Asynchronous serial data transfer
- Data encryption standard (DES) | Set 1
- Shannon-Fano Algorithm for Data Compression
- Difference Between High-level Data Link Control (HDLC) and Point-to-Point Protocol (PPP)
- Principle Of Reliable Data Transfer Protocol
- Cisco Discovery Protocol (CDP) and Link Layer Discovery Protocol (LLDP) in Data Link Layer
- Reliable Data Transfer (RDT) 2.0
- Reliable Data Transfer (RDT) 1.0
- Host Data Safeguarding
- Data Concealment Methods
- Strength of Data encryption standard (DES)
If you like GeeksforGeeks and would like to contribute, you can also write an article using contribute.geeksforgeeks.org or mail your article to firstname.lastname@example.org. See your article appearing on the GeeksforGeeks main page and help other Geeks.
Please Improve this article if you find anything incorrect by clicking on the "Improve Article" button below.