HomeDefinitionsElectronic Data Interchange: Definition, Uses and Importance

Electronic Data Interchange: Definition, Uses and Importance

Automated exchange of data between heterogeneous information systems, respecting universally accepted rules which make it possible to structure the data into messages.

Electronic Data Interchange (EDI) is the generic term defining an electronic exchange of documents and information between a computer and another same type machine.

Indeed, EDI software allows documents to be sent directly to the desired application on the recipient’s computer, without any prior processing or human intervention. In other words, EDI replaces other means of exchange and communication such as emails, letters or faxes.

Thus, the processing of documents then becomes fully automated, playing a significant role in terms of information flow, costs and communication with the teams.

In addition, it significantly improves the speed of information processing thanks to the integration of an EDI engine. The documents exchanged via this engine are generally commercial documents. Such as invoices, purchase orders and many others.

Electronic data interchange (EDI) is a technique that replaces the physical exchange of documents between companies (orders, invoices, delivery notes, etc.) by exchanges.

According to a standardized format, between computers connected by specialized links or by a (private) value-added network (VAN). The data is structured according to international technical reference standards (eg Edifact).

For example, sending an order by fax and then entering it by an operator of the supplier company is replaced by the transmission of information which is routed to a computer of the supplier company capable of interpret the command.

Mehmet S. Kaya
Mehmet S. Kayahttps://teknonel.com
Mehmet is one of the administrator of Teknonel. As a software developer, he loves to share his knowledge in related topics. He is highly familiar with the editorial process from the inception of an article idea, through the iterative process, publishing, and performance analysis as well as product reviews.

Follow us on Social Media!


Related Articles

Keylogger: Definition, Prevention and Types

The term keylogger is used to designate any computer process (software or hardware) capable of recording the sequences of keys typed on a keyboard,...

Hyperthreading: Definition, Uses and Importance

Threads are small tasks that the computer must perform simultaneously, that is to say operations that one or more open programs must execute and...

Geofencing: Definition, Uses and Importance

Geofencing is a geolocation technology that monitors the movement of objects or people within a predefined perimeter. This system is used, for example, for...

Brute Force: Definition and precautions to take

A brute force attack is a method of finding someone's password or cryptographic key in order to gain access to an online service, personal...

Explore More Articles

New Research Half of world's Great Lakes are shrinking

New Research: Half of world’s Great Lakes are shrinking

In extreme climates, frequent droughts and floods have become a major issue, and water resource management is a pressing problem. To make matters worse,...
New Research shows that mosquitoes dislike light colors

New Research shows that mosquitoes dislike light colors

Although mosquitoes respond to human breath, sweat, and body temperature, they also have dislikes, such as certain smells. A recent study published in the...
Xiaomi 13 Pro Detailed Review Specs main

Xiaomi 13 Pro: Detailed Review & Specs

While Xiaomi is in a strong position in the entry-level and mid-range smartphone market, the Chinese brand is still a little struggling in the...