ERP Service Module – Call Handling and Service Orders Control
February 12, 2025
The United States has one of the largest trade deficits in the world. Many critics have been of the opinion that it is only because of the existence of fiat currency that such huge imbalances are possible. These critics believe that if the world were to return to a gold standard, these imbalances would resolve […]
The Debate over IPR In recent years, intellectual property rights (IPR) have become the topic of intense discussion and concerted efforts by businesses to defend them. The reason for this renewed interest and vigorous protection and defense of IPR is that the theft and piracy of items like software, books, games, and movies has reached […]
Apple Inc. is the largest company in the world today. In Aug 2018, the company became the first in the world to reach a trillion dollar valuation! This meant Apple was ahead of its competition by at least $150 billion. Other companies such as Alphabet have a market capitalization close to $850 billion. The reactions […]
What is Risk ? Having the best people execute the plan does not guarantee success. There are a host of external factors which may play a role in determining the outcome regarding whether a project has been successful or not. These are called Project risks. The formal definition of a risk is an event or […]
Bill of Material (BOM) is a base functionality of setting up production module of an ERP system. A manufactured item consists of components, which are used to build the product through production operation(s). The main use of BOM is to define product structure of a manufactured end item. Routing is another important base of production […]
Kernel of an ERP system comprises of a technical module (set of tools) which provides a foundation to various application modules. These tools provide application installation and system administrations functionalities which enables efficient running of applications, within a secured environment. The technical module also provides high level COBOL and 4 GL programming languages (such as ABAP by SAP) which enable application customization and development. The important functions of analytic, report writing, queries, text management and integration with other systems such as office suite are administered through various tools contained in this module. Handling of logs and audit trails of system generated transactions is another functionality which is growing in importance, due to various regulatory requirements such as Sarbanes-Oxley, IFRC and Basel II.
Positioning of Technical modules: In addition to provide a base to various application modules, tools contained in the technical module deal with the hosting environment of the ERP system, namely RDBMS and Operating system. This is clarified in the following diagram:
Installation of an ERP system: The procedure for installation broadly comprises the following:
It may be mentioned that the job of installing an ERP system is done by competent tools experts with the help of detailed installation guides provided by the ERP vendor.
License Management: There are various types of licensing scheme offered by product vendors such as i) named users ii) package based users iii) concurrent users and iv) module based users v) power user (having access to development tools). The license management process is embedded in ERP systems for the purpose of copy protection mechanism and to regulate the commercial use of the system. However, for testing and demonstration purposes, vendors normally provides unprotected software with limited validity, which is needed to be validated and patched before a specified expiration date. The copy protection mechanism is also used by dealers to protect their customizations on the standard ERP software. The license management monitor is implemented by license daemon program.
Validation Process of License: After installation of ERP system under production environment, the software is permitted to be used for a limited period, which is counted from the date of the installation. After this period, the application software is blocked, unless it is validated by product developer.
The validation procedure begins when the requested system configuration is defined by the user immediately after the installation. A report of this configuration and a system generated security key is sent to product developer. Upon receiving the report, validation keys are sent by them which must be entered in the system by the user. The system is then initialized by setting the parameters and is ready for use.
Your email address will not be published. Required fields are marked *