SlideShare a Scribd company logo
Quick Solution Delivery Offered by Knowledge IT
                                                             Industry Wise Solutions

  Patent & Intellectual          Manufacturing        Medical & Health care        Beauty & care     Education              Oil and energy
       Property                    Industry                 Industry                 Industry         Industry                 Industry


                             Electronics              Franchising             Industry Products        Construction
 Public Utilities                                                                                                              Government
                              Industry                  Industry                 & Services              Industry




                                                             Knowledge IT Solutions

                                                          2. HR Collaborative                        3. Incidence Response
         1. IP Management (IPM)                           Management (HRCM)                          Management (IRM)



                                4. Incidence & Emergency                         5. Corporate Governance
                                Management (IEM)                                 Management (CGM)




                                                              Knowledge IT Products

                 Object                      Forensic           Administration                Project               Review
              Manager (OM)                 Manager (FM)         Manager (AM)                Manager (PM)          Manager (RM)


               Discovery                 Workflow                    Schedule              Human Resource              Corporate
              Manager (DM)             Manager (WM)                 Manager (SM)            Manager (HRM)             Manager (CM)



                                     2012 © Knowledge IT Corporation. All Rights Reserved
Pick and Use Functions that you Need
  With any application, you effectively use only 10% of the application. But with
  Knowledge IT’s SaaS applications, you use only those functions that you need.

                                                       The Knowledge IT Products


                                                         Object             Forensic
                                                      Manager (OM)        Manager (FM)


                                                        Review              Workflow
                                                      Manager (RM)        Manager (WM)



                                                     Human Resource      Administration
                                                      Manager (HRM)      Manager (AM)


                                                        Project            Discovery
                                                      Manager (PM)        Manager (DM)



                                                        Corporate          Schedule
                                                       Manager (CM)       Manager (SM)




                                                           Easy Third Party Software
                                                                  Integration



             2012 © Knowledge IT Corporation. All Rights Reserved
Knowledge IT’s 4 Types of Application
                            Based on Needs & User Demand
                      Knowledge IT offers a variety of SaaS applications which do not require initial
                      investment and installation effort, by providing easy-to-deploy software services at
                      competitive pricing. The applications supports small businesses and large
                      corporations, contributing to increasing effectiveness and reducing expenses.



 Professional                        Business                        Enterprise                          Ultimate


Individuals・SOHO                  Small and Medium               Small and Medium                   For large companies
 Personal Offices                 enterprises or                 Enterprises or                     looking for full control
  or Small Offices                Shop owners                    Enterprise Subcontractors           and autonomy

Best for individual           Suitable for system ranging      Ideal for organizations and       Highly specialized set of
use and smaller               from two to multiple users.      businesses with large groups.     administration tools in an
businesses                    Data access for packaged         Security, access privileges as    application is ideal for large groups
                              predetermined privilege based.   well as functions can be          of people in an organization. This
Typical Usage                 Secure user access.              determined by the customer and    Ultimate set comes with the freedom
Size: 1-5 Users               Typical Usage                    set/added per category of users   to build a solution view and dig-
                              Size: 2-100s of Users            from Packaged Solution.           down feature according to each
                                                               Typical Usage                     customer’s need. Role based as well
                                                               Size: 50-1000s of Users           as privilege based access control can
                                                                                                 be set by the Business and above.
                                                                                                 Typical Usage
                                                                                                 Size: 100s – 1000s of Users
                                                                                                  and above

                                2012 © Knowledge IT Corporation. All Rights Reserved
Document and Folder Management
                                                                                    Login By IP Firm

                                                                 Add documents from here               Options are provided to search
                    You can view all or latest versions
                                                                                                       your documents
                    of the documents added              By this function you can
                                                        add, modify or delete the
                                                        folder/ subfolder




                                                           Perform different operation on your
                                                           Documents under folders privileged.




Folders can be viewed in the
tree according to the privilege
provided
                                                                                                                            Folder added security wise. Secure your
                                                                                                                            documents under secured folders.




                                                   2012 © Knowledge IT Corporation. All Rights Reserved
Client by Client Folder View
                                  Login by Client1



    Secured folder and document
    view for client1




                                   Login by Client2



Secured folder and document
view for client2




             2012 © Knowledge IT Corporation. All Rights Reserved
Add Annotations/Comments
                    Login By IP Firm


                                                    Annotation added by IP Firm for
                                                    Client 1




                                                                              Login by Client 1




                                       Various Index Forms




                                                                                      Client 1 can add or respond to the
                                                                                      added annotation.



Annotation icon




                  2012 © Knowledge IT Corporation. All Rights Reserved
Document Search with Different Criteria
                         Login by Client 1


                                             Document full Text Search by different
                                             customized forms.




  Various Search Forms




                                                                                      Document Search Result for the
                                                                                      above Searched criteria.




                   2012 © Knowledge IT Corporation. All Rights Reserved
View Auto Mails on Document Operations
    Login by IP Firm           Get Document Information details by an auto mail feature whenever any
                               operation is performed like add, modify, adding annotations etc.




                                                                                   Auto Mail forwarded to Client1 after
                                                                                   adding some document attachments.




            2012 © Knowledge IT Corporation. All Rights Reserved
Document Attachment View Security Wise
                                           Login by Client1




This is a secured document
of client 2, hence Client 1
has no permission to view
this file




                              2012 © Knowledge IT Corporation. All Rights Reserved

More Related Content

PDF
IPM_E_17.3.12
PDF
IEM_E_13.2.12
PDF
IPM_E_17.3.12
PDF
IPM_E_17.3.12
PDF
IPM_E_19.3.12
PDF
IPM_E_23.4.12
PDF
IPM_E_7.4.12
PDF
IRM_E_12.03.12
IPM_E_17.3.12
IEM_E_13.2.12
IPM_E_17.3.12
IPM_E_17.3.12
IPM_E_19.3.12
IPM_E_23.4.12
IPM_E_7.4.12
IRM_E_12.03.12

What's hot (20)

PDF
IPM_E_8.2.2012
PDF
IPM_E_8.2.2012
PDF
IPM_E_8.2.2012
PDF
IPM_E_3.2.12
PDF
IRM_E_24.2.12
PDF
CMS_01.03.12
PDF
HSM_E_23.2.12
PDF
IRM_E_25.2.12
PDF
IRM_E_14.3.12
PDF
IRM_E_14.03.2012
PDF
IRM_E_15.3.12
PDF
HRCM_E_2FEB2012
PDF
IRM_E_13.03.2012
PDF
CGS_E_1.3.12
PDF
HSM_E_19.3.12
PDF
CIM_E_24.2.12
PDF
IRM_E_17.03.2012
PDF
HSM_E_17.3.12
PDF
IRM_E_17.3.12
IPM_E_8.2.2012
IPM_E_8.2.2012
IPM_E_8.2.2012
IPM_E_3.2.12
IRM_E_24.2.12
CMS_01.03.12
HSM_E_23.2.12
IRM_E_25.2.12
IRM_E_14.3.12
IRM_E_14.03.2012
IRM_E_15.3.12
HRCM_E_2FEB2012
IRM_E_13.03.2012
CGS_E_1.3.12
HSM_E_19.3.12
CIM_E_24.2.12
IRM_E_17.03.2012
HSM_E_17.3.12
IRM_E_17.3.12
Ad

Viewers also liked (15)

PDF
CIM_J_24.2.12
PDF
IRM_J_19.3.12
PDF
IRM_J_9.3.12
PPT
HRCM_3FEB2012_J
PDF
HSM_E_17.3.12
PDF
CGS_E_23.4.12
PDF
CGS_J_29.2.12
PDF
IRM_J_14.3.12
PPT
CGM-CMS_3FEB2012_J
PDF
IRM_E_12.03.12
PDF
CIM_J_24.2.12
PDF
IRM_J_28.2.12
PDF
HSM_J_19.3.12
PDF
CGS_J_19.3.12
PPT
CGM-CRM_J_3FEB2012
CIM_J_24.2.12
IRM_J_19.3.12
IRM_J_9.3.12
HRCM_3FEB2012_J
HSM_E_17.3.12
CGS_E_23.4.12
CGS_J_29.2.12
IRM_J_14.3.12
CGM-CMS_3FEB2012_J
IRM_E_12.03.12
CIM_J_24.2.12
IRM_J_28.2.12
HSM_J_19.3.12
CGS_J_19.3.12
CGM-CRM_J_3FEB2012
Ad

Similar to IPM_E_10.2.12 (10)

PDF
CGM_E_8.2.2012
PDF
HSM_E_1.4.12
PDF
HSM_E_21.4.12
PDF
HSM_E_7.4.12
PDF
CGS_E_17.3.12
PDF
IRM_E_7.4.12
PDF
HSM_E_24.2.12
PDF
CGS_E_7.4.12
PDF
CGS_E_19.3.12
PDF
IRM_E_1.4.12
CGM_E_8.2.2012
HSM_E_1.4.12
HSM_E_21.4.12
HSM_E_7.4.12
CGS_E_17.3.12
IRM_E_7.4.12
HSM_E_24.2.12
CGS_E_7.4.12
CGS_E_19.3.12
IRM_E_1.4.12

More from Hemant_Kumar_Setya (18)

PDF
HSM_J_14.6.2012
PDF
Ipm j 7april2012
PDF
HSM_J_7.4.12
PDF
IRM_J_7.4.12
PDF
IPM_J_7.4.12
PDF
HSM_J_7.4.12
PDF
CGS_J_7.4.12
PDF
IRM_J_1.4.12
PDF
IPM_J_1.4.12
PDF
HSM_J_1.4.12
PDF
CGS_J_1.4.12
PDF
CGS_E_1.4.12
PDF
CGS_J_20.3.12
PDF
IRM_J_20.3.12
PDF
IPM_J_20.3.12
PDF
HSM_J_20.3.12
PDF
IPM_J_19.3.12
PDF
IRM_J_19.3.12
HSM_J_14.6.2012
Ipm j 7april2012
HSM_J_7.4.12
IRM_J_7.4.12
IPM_J_7.4.12
HSM_J_7.4.12
CGS_J_7.4.12
IRM_J_1.4.12
IPM_J_1.4.12
HSM_J_1.4.12
CGS_J_1.4.12
CGS_E_1.4.12
CGS_J_20.3.12
IRM_J_20.3.12
IPM_J_20.3.12
HSM_J_20.3.12
IPM_J_19.3.12
IRM_J_19.3.12

Recently uploaded (20)

PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
Big Data Technologies - Introduction.pptx
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
KodekX | Application Modernization Development
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Machine learning based COVID-19 study performance prediction
PDF
cuic standard and advanced reporting.pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
Cloud computing and distributed systems.
Building Integrated photovoltaic BIPV_UPV.pdf
Review of recent advances in non-invasive hemoglobin estimation
Dropbox Q2 2025 Financial Results & Investor Presentation
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Big Data Technologies - Introduction.pptx
Understanding_Digital_Forensics_Presentation.pptx
Spectral efficient network and resource selection model in 5G networks
NewMind AI Weekly Chronicles - August'25 Week I
“AI and Expert System Decision Support & Business Intelligence Systems”
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
KodekX | Application Modernization Development
Per capita expenditure prediction using model stacking based on satellite ima...
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Machine learning based COVID-19 study performance prediction
cuic standard and advanced reporting.pdf
The AUB Centre for AI in Media Proposal.docx
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Cloud computing and distributed systems.

IPM_E_10.2.12

  • 1. Quick Solution Delivery Offered by Knowledge IT Industry Wise Solutions Patent & Intellectual Manufacturing Medical & Health care Beauty & care Education Oil and energy Property Industry Industry Industry Industry Industry Electronics Franchising Industry Products Construction Public Utilities Government Industry Industry & Services Industry Knowledge IT Solutions 2. HR Collaborative 3. Incidence Response 1. IP Management (IPM) Management (HRCM) Management (IRM) 4. Incidence & Emergency 5. Corporate Governance Management (IEM) Management (CGM) Knowledge IT Products Object Forensic Administration Project Review Manager (OM) Manager (FM) Manager (AM) Manager (PM) Manager (RM) Discovery Workflow Schedule Human Resource Corporate Manager (DM) Manager (WM) Manager (SM) Manager (HRM) Manager (CM) 2012 © Knowledge IT Corporation. All Rights Reserved
  • 2. Pick and Use Functions that you Need With any application, you effectively use only 10% of the application. But with Knowledge IT’s SaaS applications, you use only those functions that you need. The Knowledge IT Products Object Forensic Manager (OM) Manager (FM) Review Workflow Manager (RM) Manager (WM) Human Resource Administration Manager (HRM) Manager (AM) Project Discovery Manager (PM) Manager (DM) Corporate Schedule Manager (CM) Manager (SM) Easy Third Party Software Integration 2012 © Knowledge IT Corporation. All Rights Reserved
  • 3. Knowledge IT’s 4 Types of Application Based on Needs & User Demand Knowledge IT offers a variety of SaaS applications which do not require initial investment and installation effort, by providing easy-to-deploy software services at competitive pricing. The applications supports small businesses and large corporations, contributing to increasing effectiveness and reducing expenses. Professional Business Enterprise Ultimate Individuals・SOHO Small and Medium Small and Medium For large companies Personal Offices enterprises or Enterprises or looking for full control or Small Offices Shop owners Enterprise Subcontractors and autonomy Best for individual Suitable for system ranging Ideal for organizations and Highly specialized set of use and smaller from two to multiple users. businesses with large groups. administration tools in an businesses Data access for packaged Security, access privileges as application is ideal for large groups predetermined privilege based. well as functions can be of people in an organization. This Typical Usage Secure user access. determined by the customer and Ultimate set comes with the freedom Size: 1-5 Users Typical Usage set/added per category of users to build a solution view and dig- Size: 2-100s of Users from Packaged Solution. down feature according to each Typical Usage customer’s need. Role based as well Size: 50-1000s of Users as privilege based access control can be set by the Business and above. Typical Usage Size: 100s – 1000s of Users and above 2012 © Knowledge IT Corporation. All Rights Reserved
  • 4. Document and Folder Management Login By IP Firm Add documents from here Options are provided to search You can view all or latest versions your documents of the documents added By this function you can add, modify or delete the folder/ subfolder Perform different operation on your Documents under folders privileged. Folders can be viewed in the tree according to the privilege provided Folder added security wise. Secure your documents under secured folders. 2012 © Knowledge IT Corporation. All Rights Reserved
  • 5. Client by Client Folder View Login by Client1 Secured folder and document view for client1 Login by Client2 Secured folder and document view for client2 2012 © Knowledge IT Corporation. All Rights Reserved
  • 6. Add Annotations/Comments Login By IP Firm Annotation added by IP Firm for Client 1 Login by Client 1 Various Index Forms Client 1 can add or respond to the added annotation. Annotation icon 2012 © Knowledge IT Corporation. All Rights Reserved
  • 7. Document Search with Different Criteria Login by Client 1 Document full Text Search by different customized forms. Various Search Forms Document Search Result for the above Searched criteria. 2012 © Knowledge IT Corporation. All Rights Reserved
  • 8. View Auto Mails on Document Operations Login by IP Firm Get Document Information details by an auto mail feature whenever any operation is performed like add, modify, adding annotations etc. Auto Mail forwarded to Client1 after adding some document attachments. 2012 © Knowledge IT Corporation. All Rights Reserved
  • 9. Document Attachment View Security Wise Login by Client1 This is a secured document of client 2, hence Client 1 has no permission to view this file 2012 © Knowledge IT Corporation. All Rights Reserved