SlideShare a Scribd company logo
Quick Solution Delivery Offered by Knowledge IT
                                                            Industry Wise Solutions

  Patent & Intellectual          Manufacturing        Medical & Health care        Beauty & care     Education              Oil and energy
       Property                    Industry                 Industry                 Industry         Industry                 Industry


                             Electronics              Franchising             Industry Products        Construction
 Public Utilities                                                                                                              Government
                              Industry                  Industry                 & Services              Industry




                                                           Knowledge IT Solutions


                1. IP Management                              2. HR Strategy                               3. Incident Response
                       (IPM)                                 Management (HSM)                                Management (IRM)


                                   4. Emergency Incidence                           5. Corporate Governance
                                      Management (EIM)                                 Management (CGM)




                                                             Knowledge IT Products

                 Object                      Forensic           Administration                Project                Review
              Manager (OM)                 Manager (FM)         Manager (AM)                Manager (PM)           Manager (RM)


               Discovery                 Workflow                    Schedule              Human Resource              Corporate
              Manager (DM)             Manager (WM)                 Manager (SM)            Manager (HRM)             Manager (CM)


                                   2012 © Knowledge IT Corporation. All Rights Reserved
Pick and Use Functions that you Need
  With any application, you effectively use only 10% of the application. But with
  Knowledge IT’s SaaS applications, you use only those functions that you need.

                                                   The Knowledge IT Products


                                                     Object             Forensic
                                                  Manager (OM)        Manager (FM)


                                                    Review              Workflow
                                                  Manager (RM)        Manager (WM)



                                                    Project          Administration
                                                  Manager (PM)       Manager (AM)


                                                 Human Resource        Discovery
               (RM)                               Manager (HRM)       Manager (DM)



                                                    Corporate          Schedule
                                                   Manager (CM)       Manager (SM)




                                                       Easy Third Party Software
                                                              Integration


         2012 © Knowledge IT Corporation. All Rights Reserved
Knowledge IT’s 4 Types of Application
                            Based on Needs & User Demand
                      Knowledge IT offers a variety of SaaS applications which do not require initial
                      investment and installation effort, by providing easy-to-deploy software services at
                      competitive pricing. The applications supports small businesses and large
                      corporations, contributing to increasing effectiveness and reducing expenses.



 Professional                        Business                        Enterprise                          Ultimate


Individuals・SOHO                  Small and Medium               Small and Medium                   For large companies
 Personal Offices                 enterprises or                 Enterprises or                     looking for full control
  or Small Offices                Shop owners                    Enterprise Subcontractors           and autonomy

Best for individual           Suitable for system ranging      Ideal for organizations and       Highly specialized set of
use and smaller               from two to multiple users.      businesses with large groups.     administration tools in an
businesses                    Data access for packaged         Security, access privileges as    application is ideal for large groups
                              predetermined privilege based.   well as functions can be          of people in an organization. This
Size: 1-5 Users               Secure user access.              determined by the customer and    Ultimate set comes with the freedom
Users: 1 person               Size: 30 and above               set/added per category of users   to build a solution view and dig-
                              Users: 2-1000                    from Packaged Solution.           down feature according to each
                                                               Size: 50 and above                customer’s need. Role based as well
                                                               Users: 100-1000                   as privilege based access control can
                                                                                                 be set by the Business and above.
                                                                                                 Size: 100 and above
                                                                                                 Users: 100 and above


                              2012 © Knowledge IT Corporation. All Rights Reserved
Incident Search of Different Types
                                       Analyst Login




        User Login




                                                       Incident Search Result




   2012 © Knowledge IT Corporation. All Rights Reserved.
Incident Registration
       User Login




2012 © Knowledge IT Corporation. All Rights Reserved.
Incident Occurrence Notification
                           Help Desk Manager Login




Help Desk manager receive the
incident registration alert mail
                                                                                 He may also reply along
and will assign it to the
                                                                                 with any feedback or
concerned analyst.
                                                                                 suggestion.




                                     2012 © Knowledge IT Corporation. All Rights Reserved.
Incident List
                                  Analyst Login




Analyst finds an
incident assigned to him




                  2012 © Knowledge IT Corporation. All Rights Reserved.
Add Follow Up
                              Analyst Login




                                                            Analyst can add follow up if
                                                            required, to convey his message,
                                                            to user regarding an incident.
Different Index
Description Form




                   2012 © Knowledge IT Corporation. All Rights Reserved.
User Incident List
                                             User Login



                 Icon of follow up
                 added by analyst.




User finds follow up
which was added by
analyst.




                         2012 © Knowledge IT Corporation. All Rights Reserved.
Incident Closure & Notification
            User Login




                                              Analyst Login
    User may report or give his
    acknowledgement on incident
    being resolved or follow up
    added by analyst.
                                                 Analyst will find notification
                                                 of user feedback on follow up
                                                 via mail.




   2012 © Knowledge IT Corporation. All Rights Reserved.
Incident Modify
                                       Analyst Login




Lock during modify by
any user or analyst.




                        2012 © Knowledge IT Corporation. All Rights Reserved.
Incident Copy
                          User Login




                       If the problem occurs again
                       user may copy selected
                       incident to required folder.




2012 © Knowledge IT Corporation. All Rights Reserved.
On Demand Escalation
    Multiple escalations with
    various KPI’s can be set for
    multiple user.




                                                 Mail escalated when
                                                 pre-defined criteria
                                                 meets.




2012 © Knowledge IT Corporation. All Rights Reserved.

More Related Content

PDF
IRM_E_14.3.12
PDF
IRM_E_17.03.2012
PDF
IRM_E_15.3.12
PDF
IRM_E_17.3.12
PDF
IRM_E_7.4.12
PDF
IRM_E_19.3.12
PDF
IRM_E_1.4.12
PDF
IRM_E_12.03.12
IRM_E_14.3.12
IRM_E_17.03.2012
IRM_E_15.3.12
IRM_E_17.3.12
IRM_E_7.4.12
IRM_E_19.3.12
IRM_E_1.4.12
IRM_E_12.03.12

What's hot (20)

PDF
HSM_E_19.3.12
PDF
HSM_E_7.4.12
PDF
IRM_E_13.03.2012
PDF
HSM_E_17.3.12
PDF
IRM_E_24.2.12
PDF
IRM_E_25.2.12
PDF
IPM_E_10.2.12
PDF
IEM_E_13.2.12
PDF
HSM_E_17.3.12
PDF
IPM_E_3.2.12
PDF
IPM_E_17.3.12
PDF
HSM_E_23.2.12
PDF
HSM_E_21.4.12
PDF
IPM_E_17.3.12
PDF
CIM_E_24.2.12
PDF
IPM_E_17.3.12
PDF
IPM_E_7.4.12
PDF
IPM_E_23.4.12
PDF
HRCM_E_2FEB2012
HSM_E_19.3.12
HSM_E_7.4.12
IRM_E_13.03.2012
HSM_E_17.3.12
IRM_E_24.2.12
IRM_E_25.2.12
IPM_E_10.2.12
IEM_E_13.2.12
HSM_E_17.3.12
IPM_E_3.2.12
IPM_E_17.3.12
HSM_E_23.2.12
HSM_E_21.4.12
IPM_E_17.3.12
CIM_E_24.2.12
IPM_E_17.3.12
IPM_E_7.4.12
IPM_E_23.4.12
HRCM_E_2FEB2012
Ad

Viewers also liked (14)

PDF
IRM_J_28.2.12
PDF
IPM_E_8.2.2012
PDF
IPM_J_29.2.12
PDF
HSM_E_1.4.12
PDF
HSM_J_27.2.12
PDF
CIM_J_6.3.12
PDF
CMS_01.03.12
PDF
CGS_E_17.3.12
PDF
HSM_J_16.3.12
PDF
CIM_J_12.3.12
PDF
IPM_J_19.3.12
PDF
IRM_J_14.2.12
PDF
IPM_J_1.4.12
PDF
IPM_J_7.4.12
IRM_J_28.2.12
IPM_E_8.2.2012
IPM_J_29.2.12
HSM_E_1.4.12
HSM_J_27.2.12
CIM_J_6.3.12
CMS_01.03.12
CGS_E_17.3.12
HSM_J_16.3.12
CIM_J_12.3.12
IPM_J_19.3.12
IRM_J_14.2.12
IPM_J_1.4.12
IPM_J_7.4.12
Ad

Similar to IRM_E_14.03.2012 (9)

PDF
CGS_E_1.3.12
PDF
IPM_E_8.2.2012
PDF
IPM_E_8.2.2012
PDF
CGS_E_7.4.12
PDF
CGS_E_1.4.12
PDF
CGS_E_23.4.12
PDF
CGS_E_19.3.12
PDF
CGM_E_8.2.2012
PDF
HSM_E_24.2.12
CGS_E_1.3.12
IPM_E_8.2.2012
IPM_E_8.2.2012
CGS_E_7.4.12
CGS_E_1.4.12
CGS_E_23.4.12
CGS_E_19.3.12
CGM_E_8.2.2012
HSM_E_24.2.12

More from Hemant_Kumar_Setya (17)

PDF
HSM_J_14.6.2012
PDF
Ipm j 7april2012
PDF
HSM_J_7.4.12
PDF
IRM_J_7.4.12
PDF
HSM_J_7.4.12
PDF
CGS_J_7.4.12
PDF
IRM_J_1.4.12
PDF
HSM_J_1.4.12
PDF
CGS_J_1.4.12
PDF
CGS_J_20.3.12
PDF
IRM_J_20.3.12
PDF
IPM_J_20.3.12
PDF
HSM_J_20.3.12
PDF
IPM_J_19.3.12
PDF
IRM_J_19.3.12
PDF
CGS_J_19.3.12
PDF
IRM_J_19.3.12
HSM_J_14.6.2012
Ipm j 7april2012
HSM_J_7.4.12
IRM_J_7.4.12
HSM_J_7.4.12
CGS_J_7.4.12
IRM_J_1.4.12
HSM_J_1.4.12
CGS_J_1.4.12
CGS_J_20.3.12
IRM_J_20.3.12
IPM_J_20.3.12
HSM_J_20.3.12
IPM_J_19.3.12
IRM_J_19.3.12
CGS_J_19.3.12
IRM_J_19.3.12

Recently uploaded (20)

PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PPTX
Cloud computing and distributed systems.
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Machine learning based COVID-19 study performance prediction
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Understanding_Digital_Forensics_Presentation.pptx
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Cloud computing and distributed systems.
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Chapter 3 Spatial Domain Image Processing.pdf
Encapsulation_ Review paper, used for researhc scholars
Building Integrated photovoltaic BIPV_UPV.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Advanced methodologies resolving dimensionality complications for autism neur...
Per capita expenditure prediction using model stacking based on satellite ima...
Dropbox Q2 2025 Financial Results & Investor Presentation
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Spectral efficient network and resource selection model in 5G networks
Machine learning based COVID-19 study performance prediction
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm

IRM_E_14.03.2012

  • 1. Quick Solution Delivery Offered by Knowledge IT Industry Wise Solutions Patent & Intellectual Manufacturing Medical & Health care Beauty & care Education Oil and energy Property Industry Industry Industry Industry Industry Electronics Franchising Industry Products Construction Public Utilities Government Industry Industry & Services Industry Knowledge IT Solutions 1. IP Management 2. HR Strategy 3. Incident Response (IPM) Management (HSM) Management (IRM) 4. Emergency Incidence 5. Corporate Governance Management (EIM) Management (CGM) Knowledge IT Products Object Forensic Administration Project Review Manager (OM) Manager (FM) Manager (AM) Manager (PM) Manager (RM) Discovery Workflow Schedule Human Resource Corporate Manager (DM) Manager (WM) Manager (SM) Manager (HRM) Manager (CM) 2012 © Knowledge IT Corporation. All Rights Reserved
  • 2. Pick and Use Functions that you Need With any application, you effectively use only 10% of the application. But with Knowledge IT’s SaaS applications, you use only those functions that you need. The Knowledge IT Products Object Forensic Manager (OM) Manager (FM) Review Workflow Manager (RM) Manager (WM) Project Administration Manager (PM) Manager (AM) Human Resource Discovery (RM) Manager (HRM) Manager (DM) Corporate Schedule Manager (CM) Manager (SM) Easy Third Party Software Integration 2012 © Knowledge IT Corporation. All Rights Reserved
  • 3. Knowledge IT’s 4 Types of Application Based on Needs & User Demand Knowledge IT offers a variety of SaaS applications which do not require initial investment and installation effort, by providing easy-to-deploy software services at competitive pricing. The applications supports small businesses and large corporations, contributing to increasing effectiveness and reducing expenses. Professional Business Enterprise Ultimate Individuals・SOHO Small and Medium Small and Medium For large companies Personal Offices enterprises or Enterprises or looking for full control or Small Offices Shop owners Enterprise Subcontractors and autonomy Best for individual Suitable for system ranging Ideal for organizations and Highly specialized set of use and smaller from two to multiple users. businesses with large groups. administration tools in an businesses Data access for packaged Security, access privileges as application is ideal for large groups predetermined privilege based. well as functions can be of people in an organization. This Size: 1-5 Users Secure user access. determined by the customer and Ultimate set comes with the freedom Users: 1 person Size: 30 and above set/added per category of users to build a solution view and dig- Users: 2-1000 from Packaged Solution. down feature according to each Size: 50 and above customer’s need. Role based as well Users: 100-1000 as privilege based access control can be set by the Business and above. Size: 100 and above Users: 100 and above 2012 © Knowledge IT Corporation. All Rights Reserved
  • 4. Incident Search of Different Types Analyst Login User Login Incident Search Result 2012 © Knowledge IT Corporation. All Rights Reserved.
  • 5. Incident Registration User Login 2012 © Knowledge IT Corporation. All Rights Reserved.
  • 6. Incident Occurrence Notification Help Desk Manager Login Help Desk manager receive the incident registration alert mail He may also reply along and will assign it to the with any feedback or concerned analyst. suggestion. 2012 © Knowledge IT Corporation. All Rights Reserved.
  • 7. Incident List Analyst Login Analyst finds an incident assigned to him 2012 © Knowledge IT Corporation. All Rights Reserved.
  • 8. Add Follow Up Analyst Login Analyst can add follow up if required, to convey his message, to user regarding an incident. Different Index Description Form 2012 © Knowledge IT Corporation. All Rights Reserved.
  • 9. User Incident List User Login Icon of follow up added by analyst. User finds follow up which was added by analyst. 2012 © Knowledge IT Corporation. All Rights Reserved.
  • 10. Incident Closure & Notification User Login Analyst Login User may report or give his acknowledgement on incident being resolved or follow up added by analyst. Analyst will find notification of user feedback on follow up via mail. 2012 © Knowledge IT Corporation. All Rights Reserved.
  • 11. Incident Modify Analyst Login Lock during modify by any user or analyst. 2012 © Knowledge IT Corporation. All Rights Reserved.
  • 12. Incident Copy User Login If the problem occurs again user may copy selected incident to required folder. 2012 © Knowledge IT Corporation. All Rights Reserved.
  • 13. On Demand Escalation Multiple escalations with various KPI’s can be set for multiple user. Mail escalated when pre-defined criteria meets. 2012 © Knowledge IT Corporation. All Rights Reserved.