SlideShare a Scribd company logo
Quick Solution delivery offered by Knowledge IT
                                                             Industry Wise Solutions

  Patent & Intellectual        Manufacturing       Medical & Health care        Beauty & care      Education             Oil and energy
       Property                  Industry                Industry                 Industry          Industry                 Industry

                           Electronics             Franchising             Industry Products        Construction
 Public Utilities                                                                                                           Government
                            Industry                 Industry                 & Services              Industry




                                                             Knowledge IT Solutions


         1. IP Management (IPM)                         2. HR Collaborative                      3. Incidence Response
                                                        Management (HRCM)                        Management (IRM)



         4. Incidence & Emergency                       5. Corporate Governance                  6. Corporate Governance
         Management (IEM)                               Management (CGM)                         Management –CRM (CGM-CRM)




                                                                Knowledge IT Products


                  Object                   Forensic             Administration             Review                Project
               Manager (OM)              Manager (FM)           Manager (AM)             Manager (RM)          Manager (PM)

                                                                                                                 Corporate
                 Discovery                 Workflow               Schedule             Human Resource
                                                                                                                Manager (CM)
                Manager (DM)             Manager (WM)            Manager (SM)           Manager (HRM)


                                    2012 © Knowledge IT Corporation. All Rights Reserved
Pick and Use Functions that you Need
  With any application, you effectively use only 10% of the application. But with
  Knowledge IT’s SaaS applications, you use only those functions that you need.
                                                   The Knowledge IT Products
                                                     Object          Administration
                                                  Manager (OM)       Manager (AM)

                                                    Review             Schedule
                                                  Manager (RM)        Manager (SM)
                                                     Human
                                                    Resource            Forensic
                                                  Manager (HRM)       Manager (FM)

                                                   Corporate           Workflow
                                                  Manager (CM)       Manager (WM)

                                                     Billing            Project
                                                  Manager (BM)        Manager (PM)

                                                      Easy Third Party Software
                                                             Integration




         2012 © Knowledge IT Corporation. All Rights Reserved
Knowledge IT’s 4 Types of Application
                            Based on Needs & User Demand
                      Knowledge IT offers a variety of SaaS applications which do not require initial
                      investment and installation effort, by providing easy-to-deploy software services at
                      competitive pricing. The applications supports small businesses and large
                      corporations, contributing to increasing effectiveness and reducing expenses.



 Professional                        Business                        Enterprise                          Ultimate


Individuals・SOHO                  Small and Medium               Small and Medium                   For large companies
 Personal Offices                 enterprises or                 Enterprises or                     looking for full control
  or Small Offices                Shop owners                    Enterprise Subcontractors           and autonomy

Best for individual           Suitable for system ranging      Ideal for organizations and       Highly specialized set of
use and smaller               from two to multiple users.      businesses with large groups.     administration tools in an
businesses                    Data access for packaged         Security, access privileges as    application is ideal for large groups
                              predetermined privilege based.   well as functions can be          of people in an organization. This
Typical Usage                 Secure user access.              determined by the customer and    Ultimate set comes with the freedom
Size: 1-5 Users               Typical Usage                    set/added per category of users   to build a solution view and dig-
                              Size: 2-100s of Users            from Packaged Solution.           down feature according to each
                                                               Typical Usage                     customer’s need. Role based as well
                                                               Size: 50-1000s of Users           as privilege based access control can
                                                                                                 be set by the Business and above.
                                                                                                 Typical Usage
                                                                                                 Size: 100s – 1000s of Users
                                                                                                  and above

                                2012 © Knowledge IT Corporation. All Rights Reserved
Folder Registration Management
                                 Folder registered security
                                 wise.




                                       Login by IP Firm. Various folders can be created security wise
                                       and viewed by the clients accordingly. Data of clients can only
                                       be viewed and can not be modified or deleted as per security
                                       features provided.




    2012 © Knowledge IT Corporation. All Rights Reserved
Folder View by different Clients




Client 1 has the access to these folders. He
can not see the folders and data of Client 2.
Client 1 can modify, copy or delete the
documents




                          Client 2 can see only those folders for which security has been
                          provided. Client 2 can not see the data of client 1 and hence there
                          is secure access of your data. Client 2 can modify, copy or delete
                          the documents as per the security.




                                                2012 © Knowledge IT Corporation. All Rights Reserved
Adding Annotations/Comments

                                                                                        IP Firm can add, modify
                                                                                        or delete the annotation/
                                                                                        comment for Client1 and
                                                                                                                    Annotation Icon
                                                                                        Client-2




                                                    Client 2 can add, view and delete
                                                    the annotation/Comments for a
                                                    particular document.




Client 1 can add, modify and view
the annotation/Comments for a
particular document.




                                       2012 © Knowledge IT Corporation. All Rights Reserved
Document Search


                            Document Full Text search by Client 1




                 Document Full Text search by Client 2 with
                 more added fields like Create Date and author
                 name




2012 © Knowledge IT Corporation. All Rights Reserved
Escalation Mail on various Document Operations




Add operation performed
on document either by
client1 or Client2




                                             Mail is observed in
                                             the Review manager
                                             of Client1 or client 2
                                             accordingly




                          2012 © Knowledge IT Corporation. All Rights Reserved

More Related Content

PDF
IPM_E_8.2.2012
PDF
IPM_E_8.2.2012
PDF
IPM_E_8.2.2012
PDF
HRCM_E_2FEB2012
PDF
HSM_E_23.2.12
PDF
IPM_E_17.3.12
PDF
IPM_E_10.2.12
PDF
IPM_E_17.3.12
IPM_E_8.2.2012
IPM_E_8.2.2012
IPM_E_8.2.2012
HRCM_E_2FEB2012
HSM_E_23.2.12
IPM_E_17.3.12
IPM_E_10.2.12
IPM_E_17.3.12

What's hot (20)

PDF
IRM_E_25.2.12
PDF
IPM_E_17.3.12
PDF
HSM_E_17.3.12
PDF
IRM_E_12.03.12
PDF
HSM_E_19.3.12
PDF
IRM_E_24.2.12
PDF
HSM_E_7.4.12
PDF
HSM_E_24.2.12
PDF
IEM_E_13.2.12
PDF
IRM_E_14.3.12
PDF
IPM_E_19.3.12
PDF
IRM_E_15.3.12
PDF
IPM_E_23.4.12
PDF
IPM_E_7.4.12
PDF
HSM_E_17.3.12
PDF
IRM_E_14.03.2012
PDF
IRM_E_13.03.2012
PDF
CMS_01.03.12
PDF
IRM_E_17.03.2012
IRM_E_25.2.12
IPM_E_17.3.12
HSM_E_17.3.12
IRM_E_12.03.12
HSM_E_19.3.12
IRM_E_24.2.12
HSM_E_7.4.12
HSM_E_24.2.12
IEM_E_13.2.12
IRM_E_14.3.12
IPM_E_19.3.12
IRM_E_15.3.12
IPM_E_23.4.12
IPM_E_7.4.12
HSM_E_17.3.12
IRM_E_14.03.2012
IRM_E_13.03.2012
CMS_01.03.12
IRM_E_17.03.2012
Ad

Viewers also liked (12)

PDF
CGS_E_7.4.12
PDF
IRM_J_20.3.12
PDF
IRM_E_19.3.12
PDF
IPM_J_28.2.12
PDF
IPM_J_11.02.2012
PDF
HSM_J_7.4.12
PDF
CGS_E_19.3.12
PDF
IPM_J_28.2.12
PDF
HRCM_J_3.2.12
PDF
IPM_J_20.3.12
PDF
CIM_J_29.2.12
PDF
CIM_J_6.3.12
CGS_E_7.4.12
IRM_J_20.3.12
IRM_E_19.3.12
IPM_J_28.2.12
IPM_J_11.02.2012
HSM_J_7.4.12
CGS_E_19.3.12
IPM_J_28.2.12
HRCM_J_3.2.12
IPM_J_20.3.12
CIM_J_29.2.12
CIM_J_6.3.12
Ad

Similar to IPM_E_3.2.12 (9)

PDF
CGM_E_8.2.2012
PDF
CIM_E_24.2.12
PDF
CGS_E_1.3.12
PDF
IRM_E_17.3.12
PDF
IRM_E_7.4.12
PDF
IRM_E_1.4.12
PDF
HSM_E_21.4.12
PDF
CGS_E_23.4.12
PDF
CGS_E_1.4.12
CGM_E_8.2.2012
CIM_E_24.2.12
CGS_E_1.3.12
IRM_E_17.3.12
IRM_E_7.4.12
IRM_E_1.4.12
HSM_E_21.4.12
CGS_E_23.4.12
CGS_E_1.4.12

More from Hemant_Kumar_Setya (17)

PDF
HSM_J_14.6.2012
PDF
Ipm j 7april2012
PDF
HSM_J_7.4.12
PDF
IRM_J_7.4.12
PDF
IPM_J_7.4.12
PDF
CGS_J_7.4.12
PDF
IRM_J_1.4.12
PDF
IPM_J_1.4.12
PDF
HSM_E_1.4.12
PDF
HSM_J_1.4.12
PDF
CGS_J_1.4.12
PDF
CGS_J_20.3.12
PDF
HSM_J_20.3.12
PDF
IPM_J_19.3.12
PDF
IRM_J_19.3.12
PDF
CGS_J_19.3.12
PDF
IRM_J_19.3.12
HSM_J_14.6.2012
Ipm j 7april2012
HSM_J_7.4.12
IRM_J_7.4.12
IPM_J_7.4.12
CGS_J_7.4.12
IRM_J_1.4.12
IPM_J_1.4.12
HSM_E_1.4.12
HSM_J_1.4.12
CGS_J_1.4.12
CGS_J_20.3.12
HSM_J_20.3.12
IPM_J_19.3.12
IRM_J_19.3.12
CGS_J_19.3.12
IRM_J_19.3.12

Recently uploaded (20)

PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
KodekX | Application Modernization Development
PDF
cuic standard and advanced reporting.pdf
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
A Presentation on Artificial Intelligence
PDF
Modernizing your data center with Dell and AMD
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Cloud computing and distributed systems.
PDF
Empathic Computing: Creating Shared Understanding
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
KodekX | Application Modernization Development
cuic standard and advanced reporting.pdf
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
20250228 LYD VKU AI Blended-Learning.pptx
NewMind AI Monthly Chronicles - July 2025
Building Integrated photovoltaic BIPV_UPV.pdf
Unlocking AI with Model Context Protocol (MCP)
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
A Presentation on Artificial Intelligence
Modernizing your data center with Dell and AMD
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Network Security Unit 5.pdf for BCA BBA.
Cloud computing and distributed systems.
Empathic Computing: Creating Shared Understanding

IPM_E_3.2.12

  • 1. Quick Solution delivery offered by Knowledge IT Industry Wise Solutions Patent & Intellectual Manufacturing Medical & Health care Beauty & care Education Oil and energy Property Industry Industry Industry Industry Industry Electronics Franchising Industry Products Construction Public Utilities Government Industry Industry & Services Industry Knowledge IT Solutions 1. IP Management (IPM) 2. HR Collaborative 3. Incidence Response Management (HRCM) Management (IRM) 4. Incidence & Emergency 5. Corporate Governance 6. Corporate Governance Management (IEM) Management (CGM) Management –CRM (CGM-CRM) Knowledge IT Products Object Forensic Administration Review Project Manager (OM) Manager (FM) Manager (AM) Manager (RM) Manager (PM) Corporate Discovery Workflow Schedule Human Resource Manager (CM) Manager (DM) Manager (WM) Manager (SM) Manager (HRM) 2012 © Knowledge IT Corporation. All Rights Reserved
  • 2. Pick and Use Functions that you Need With any application, you effectively use only 10% of the application. But with Knowledge IT’s SaaS applications, you use only those functions that you need. The Knowledge IT Products Object Administration Manager (OM) Manager (AM) Review Schedule Manager (RM) Manager (SM) Human Resource Forensic Manager (HRM) Manager (FM) Corporate Workflow Manager (CM) Manager (WM) Billing Project Manager (BM) Manager (PM) Easy Third Party Software Integration 2012 © Knowledge IT Corporation. All Rights Reserved
  • 3. Knowledge IT’s 4 Types of Application Based on Needs & User Demand Knowledge IT offers a variety of SaaS applications which do not require initial investment and installation effort, by providing easy-to-deploy software services at competitive pricing. The applications supports small businesses and large corporations, contributing to increasing effectiveness and reducing expenses. Professional Business Enterprise Ultimate Individuals・SOHO Small and Medium Small and Medium For large companies Personal Offices enterprises or Enterprises or looking for full control or Small Offices Shop owners Enterprise Subcontractors and autonomy Best for individual Suitable for system ranging Ideal for organizations and Highly specialized set of use and smaller from two to multiple users. businesses with large groups. administration tools in an businesses Data access for packaged Security, access privileges as application is ideal for large groups predetermined privilege based. well as functions can be of people in an organization. This Typical Usage Secure user access. determined by the customer and Ultimate set comes with the freedom Size: 1-5 Users Typical Usage set/added per category of users to build a solution view and dig- Size: 2-100s of Users from Packaged Solution. down feature according to each Typical Usage customer’s need. Role based as well Size: 50-1000s of Users as privilege based access control can be set by the Business and above. Typical Usage Size: 100s – 1000s of Users and above 2012 © Knowledge IT Corporation. All Rights Reserved
  • 4. Folder Registration Management Folder registered security wise. Login by IP Firm. Various folders can be created security wise and viewed by the clients accordingly. Data of clients can only be viewed and can not be modified or deleted as per security features provided. 2012 © Knowledge IT Corporation. All Rights Reserved
  • 5. Folder View by different Clients Client 1 has the access to these folders. He can not see the folders and data of Client 2. Client 1 can modify, copy or delete the documents Client 2 can see only those folders for which security has been provided. Client 2 can not see the data of client 1 and hence there is secure access of your data. Client 2 can modify, copy or delete the documents as per the security. 2012 © Knowledge IT Corporation. All Rights Reserved
  • 6. Adding Annotations/Comments IP Firm can add, modify or delete the annotation/ comment for Client1 and Annotation Icon Client-2 Client 2 can add, view and delete the annotation/Comments for a particular document. Client 1 can add, modify and view the annotation/Comments for a particular document. 2012 © Knowledge IT Corporation. All Rights Reserved
  • 7. Document Search Document Full Text search by Client 1 Document Full Text search by Client 2 with more added fields like Create Date and author name 2012 © Knowledge IT Corporation. All Rights Reserved
  • 8. Escalation Mail on various Document Operations Add operation performed on document either by client1 or Client2 Mail is observed in the Review manager of Client1 or client 2 accordingly 2012 © Knowledge IT Corporation. All Rights Reserved