ERP Service Module – Call Handling and Service Orders Control
February 12, 2025
Business Process Improvement project happen to be the most effective tool to bring in effective process and operating efficiencies in any field of business operations. Organizations use BPI programs to overhaul the existing processes, remove redundancies and to adapt to the changing demands and conditions of the Customers. As the business environment keeps changing and […]
Today every individual entrepreneur owned businesses as well as Corporates have changed the way they look at their vision and business planning. Companies how ever big or small are no longer operating in domestic markets alone, for they have at their disposal the entire global market which is just waiting to be captured. The globalization […]
One of the most important purposes of development of computer systems was the database application which could have been used on them. Data processing drove growth of computer processor speed. In fact, data processing predates the computers; punched cards were used in the US for collecting data for census during beginning of 20th century. Earliest […]
In previous articles, we have discussed how risk management teams and the management can help in planning for contingencies. In this article, we look at the role that external consultants can play in formulating and shaping a company’s business continuity planning. For starters, the biggest advantage that external consultants have over in house risk management […]
Globalization is a phenomenon that can mean many things to many people. For the workers and the executives in the manufacturing units of China, it can mean new opportunities and the chance to earn a decent living. For the software engineers in India, it can mean an upward mobility towards greater economic and social status. […]
Kernel of an ERP system comprises of a technical module (set of tools) which provides a foundation to various application modules. These tools provide application installation and system administrations functionalities which enables efficient running of applications, within a secured environment. The technical module also provides high level COBOL and 4 GL programming languages (such as ABAP by SAP) which enable application customization and development. The important functions of analytic, report writing, queries, text management and integration with other systems such as office suite are administered through various tools contained in this module. Handling of logs and audit trails of system generated transactions is another functionality which is growing in importance, due to various regulatory requirements such as Sarbanes-Oxley, IFRC and Basel II.
Positioning of Technical modules: In addition to provide a base to various application modules, tools contained in the technical module deal with the hosting environment of the ERP system, namely RDBMS and Operating system. This is clarified in the following diagram:
Installation of an ERP system: The procedure for installation broadly comprises the following:
It may be mentioned that the job of installing an ERP system is done by competent tools experts with the help of detailed installation guides provided by the ERP vendor.
License Management: There are various types of licensing scheme offered by product vendors such as i) named users ii) package based users iii) concurrent users and iv) module based users v) power user (having access to development tools). The license management process is embedded in ERP systems for the purpose of copy protection mechanism and to regulate the commercial use of the system. However, for testing and demonstration purposes, vendors normally provides unprotected software with limited validity, which is needed to be validated and patched before a specified expiration date. The copy protection mechanism is also used by dealers to protect their customizations on the standard ERP software. The license management monitor is implemented by license daemon program.
Validation Process of License: After installation of ERP system under production environment, the software is permitted to be used for a limited period, which is counted from the date of the installation. After this period, the application software is blocked, unless it is validated by product developer.
The validation procedure begins when the requested system configuration is defined by the user immediately after the installation. A report of this configuration and a system generated security key is sent to product developer. Upon receiving the report, validation keys are sent by them which must be entered in the system by the user. The system is then initialized by setting the parameters and is ready for use.
Your email address will not be published. Required fields are marked *