SlideShare uma empresa Scribd logo
1 de 14
Quick Solution Delivery Offered by Knowledge IT
                                                          Industry Wise Solutions
  Patent & Intellectual          Manufacturing          Medical & Health care         Beauty & care     Education              Oil and energy
       Property                    Industry                   Industry                  Industry         Industry                 Industry


                             Electronics                Franchising              Industry Products        Construction
 Public Utilities                                                                                                                 Government
                              Industry                    Industry                  & Services              Industry




                                                          Knowledge IT Solutions


        1. HR Strategy                      2. Intellectual Property            3. Incident Response           4. Corporate Governance
        Management (HSM)                      Management (IPM)                  Management (IRM)               Management (CGM)




                                                           Knowledge IT Products
                 Object                      Forensic             Administration                 Project               Review
              Manager (OM)                 Manager (FM)           Manager (AM)                 Manager (PM)          Manager (RM)


               Discovery                 Workflow                       Schedule              Human Resource              Corporate
              Manager (DM)             Manager (WM)                    Manager (SM)            Manager (HRM)             Manager (CM)



                                     2012 © Knowledge IT Corporation. All Rights Reserved
Pick and Use Functions that you Need
  With any application, you effectively use only 10% of the application. But with
  Knowledge IT’s SaaS applications, you use only those functions that you need.

                                                   The Knowledge IT Products


                                                     Object             Forensic
                                                  Manager (OM)        Manager (FM)


                                                    Review              Workflow
                                                  Manager (RM)        Manager (WM)



                                                    Project          Administration
                                                  Manager (PM)       Manager (AM)


                                                 Human Resource        Discovery
               (RM)                               Manager (HRM)       Manager (DM)



                                                    Corporate          Schedule
                                                   Manager (CM)       Manager (SM)




                                                       Easy Third Party Software
                                                              Integration


         2012 © Knowledge IT Corporation. All Rights Reserved
Knowledge IT’s 4 Types of Application
                            Based on Needs & User Demand
                      Knowledge IT offers a variety of SaaS applications which do not require initial
                      investment and installation effort, by providing easy-to-deploy software services at
                      competitive pricing. The applications supports small businesses and large
                      corporations, contributing to increasing effectiveness and reducing expenses.



 Professional                        Business                        Enterprise                          Ultimate


Individuals・SOHO                  Small and Medium                Small and Medium                  For large companies
 Personal Offices                 enterprises or                  Enterprises or                    looking for full control
  or Small Offices                Shop owners                     Enterprise Subcontractors          and autonomy

Best for individual           Suitable for system ranging      Ideal for organizations and       Highly specialized set of
use and smaller               from two to multiple users.      businesses with large groups.     administration tools in an
businesses                    Data access for packaged         Security, access privileges as    application is ideal for large groups
                              predetermined privilege based.   well as functions can be          of people in an organization. This
Size: 1-5 Persons             Secure user access.              determined by the customer and    Ultimate set comes with the freedom
User: 1 Person                                                 set/added per category of users   to build a solution view and dig-
                              Size: 2-1000 Persons             from Packaged Solution.           down feature according to each
                              User: 30 and above                                                 customer’s need. Role based as well
                                                               Size: 100-1000 Persons            as privilege based access control can
                                                               User: 50 and above                be set by the Business and above.

                                                                                                 Size: 100 Persons and above
                                                                                                 User: 100 and above

                              2012 © Knowledge IT Corporation. All Rights Reserved
Folder Management




2012 © Knowledge IT Corporation. All Rights Reserved.
Incident Search of Different Types
                                       Analyst Login




        User Login




                                                       Incident Search Result




   2012 © Knowledge IT Corporation. All Rights Reserved.
Incident Registration
       User Login




2012 © Knowledge IT Corporation. All Rights Reserved.
Incident Occurrence Notification
                           Help Desk Manager Login




Help Desk manager receive the
incident registration alert mail
                                                                                 He may also reply along
and will assign it to the
                                                                                 with any feedback or
concerned analyst.
                                                                                 suggestion.




                                     2012 © Knowledge IT Corporation. All Rights Reserved.
Incident List
                                  Analyst Login




Analyst finds an
incident assigned to him




                  2012 © Knowledge IT Corporation. All Rights Reserved.
Add Follow Up
                              Analyst Login




                                                            Analyst can add follow up if
                                                            required, to convey his message,
                                                            to user regarding an incident.
Different Index
Description Form




                   2012 © Knowledge IT Corporation. All Rights Reserved.
User Incident List
                                             User Login



                 Icon of follow up
                 added by analyst.




User finds follow up
attached by analyst.




                         2012 © Knowledge IT Corporation. All Rights Reserved.
Incident Closure & Notification
            User Login




                                              Analyst Login
    User may report or give his
    acknowledgement on incident
    being resolved or follow up
    added by analyst.
                                                 Analyst will find notification
                                                 of user feedback on follow up
                                                 via mail.




   2012 © Knowledge IT Corporation. All Rights Reserved.
Incident Modify
                                       Analyst Login




Lock during modify by
any user or analyst.




                        2012 © Knowledge IT Corporation. All Rights Reserved.
Incident Copy
                          User Login




                       If the problem occurs again
                       user may copy selected
                       incident to required folder.




2012 © Knowledge IT Corporation. All Rights Reserved.
On Demand Escalation
    Multiple escalations with
    various KPI’s can be set for
    multiple user.




                                                  Mail escalated when
                                                  defined criteria meets.




2012 © Knowledge IT Corporation. All Rights Reserved.

Mais conteúdo relacionado

Mais procurados (20)

HSM_E_17.3.12
HSM_E_17.3.12HSM_E_17.3.12
HSM_E_17.3.12
 
HSM_E_7.4.12
HSM_E_7.4.12HSM_E_7.4.12
HSM_E_7.4.12
 
IPM
IPMIPM
IPM
 
IPM_E_17.3.12
IPM_E_17.3.12IPM_E_17.3.12
IPM_E_17.3.12
 
HSM_E_17.3.12
HSM_E_17.3.12HSM_E_17.3.12
HSM_E_17.3.12
 
IPM_E_17.3.12
IPM_E_17.3.12IPM_E_17.3.12
IPM_E_17.3.12
 
IPM_E_17.3.12
IPM_E_17.3.12IPM_E_17.3.12
IPM_E_17.3.12
 
IPM_E_7.4.12
IPM_E_7.4.12IPM_E_7.4.12
IPM_E_7.4.12
 
IPM_E_23.4.12
IPM_E_23.4.12IPM_E_23.4.12
IPM_E_23.4.12
 
IPM_E_19.3.12
IPM_E_19.3.12IPM_E_19.3.12
IPM_E_19.3.12
 
HSM_E_21.4.12
HSM_E_21.4.12HSM_E_21.4.12
HSM_E_21.4.12
 
IRM_E_12.03.12
IRM_E_12.03.12IRM_E_12.03.12
IRM_E_12.03.12
 
HSM_E_23.2.12
HSM_E_23.2.12HSM_E_23.2.12
HSM_E_23.2.12
 
CGS_E_1.4.12
CGS_E_1.4.12CGS_E_1.4.12
CGS_E_1.4.12
 
IRM_E_24.2.12
IRM_E_24.2.12IRM_E_24.2.12
IRM_E_24.2.12
 
IPM_E_3.2.12
IPM_E_3.2.12IPM_E_3.2.12
IPM_E_3.2.12
 
IEM_E_13.2.12
IEM_E_13.2.12IEM_E_13.2.12
IEM_E_13.2.12
 
IPM_E_10.2.12
IPM_E_10.2.12IPM_E_10.2.12
IPM_E_10.2.12
 
IRM_E_25.2.12
IRM_E_25.2.12IRM_E_25.2.12
IRM_E_25.2.12
 
IRM_E_13.03.2012
IRM_E_13.03.2012IRM_E_13.03.2012
IRM_E_13.03.2012
 

Destaque (7)

IPM_J_28.2.12
IPM_J_28.2.12IPM_J_28.2.12
IPM_J_28.2.12
 
HSM_E_24.2.12
HSM_E_24.2.12HSM_E_24.2.12
HSM_E_24.2.12
 
IPM_J_11.02.2012
IPM_J_11.02.2012IPM_J_11.02.2012
IPM_J_11.02.2012
 
IRM_J_20.3.12
IRM_J_20.3.12IRM_J_20.3.12
IRM_J_20.3.12
 
CIM_J_6.3.12
CIM_J_6.3.12CIM_J_6.3.12
CIM_J_6.3.12
 
IPM_J_28.2.12
IPM_J_28.2.12IPM_J_28.2.12
IPM_J_28.2.12
 
HRCM_J_3.2.12
HRCM_J_3.2.12HRCM_J_3.2.12
HRCM_J_3.2.12
 

Semelhante a IRM_E_19.3.12 (10)

CIM_E_24.2.12
CIM_E_24.2.12CIM_E_24.2.12
CIM_E_24.2.12
 
CGS_E_19.3.12
CGS_E_19.3.12CGS_E_19.3.12
CGS_E_19.3.12
 
CGS_E_23.4.12
CGS_E_23.4.12CGS_E_23.4.12
CGS_E_23.4.12
 
CGS_E_7.4.12
CGS_E_7.4.12CGS_E_7.4.12
CGS_E_7.4.12
 
HRCM_E_2FEB2012
HRCM_E_2FEB2012HRCM_E_2FEB2012
HRCM_E_2FEB2012
 
CGS_E_17.3.12
CGS_E_17.3.12CGS_E_17.3.12
CGS_E_17.3.12
 
CGS_E_1.3.12
CGS_E_1.3.12CGS_E_1.3.12
CGS_E_1.3.12
 
CMS_01.03.12
CMS_01.03.12CMS_01.03.12
CMS_01.03.12
 
CGM_E_8.2.2012
CGM_E_8.2.2012CGM_E_8.2.2012
CGM_E_8.2.2012
 
HSM_E_1.4.12
HSM_E_1.4.12HSM_E_1.4.12
HSM_E_1.4.12
 

Mais de Hemant_Kumar_Setya (18)

HSM_J_14.6.2012
HSM_J_14.6.2012HSM_J_14.6.2012
HSM_J_14.6.2012
 
Ipm j 7april2012
Ipm j 7april2012Ipm j 7april2012
Ipm j 7april2012
 
HSM_J_7.4.12
HSM_J_7.4.12HSM_J_7.4.12
HSM_J_7.4.12
 
IRM_J_7.4.12
IRM_J_7.4.12IRM_J_7.4.12
IRM_J_7.4.12
 
IPM_J_7.4.12
IPM_J_7.4.12IPM_J_7.4.12
IPM_J_7.4.12
 
HSM_J_7.4.12
HSM_J_7.4.12HSM_J_7.4.12
HSM_J_7.4.12
 
CGS_J_7.4.12
CGS_J_7.4.12CGS_J_7.4.12
CGS_J_7.4.12
 
IRM_J_1.4.12
IRM_J_1.4.12IRM_J_1.4.12
IRM_J_1.4.12
 
IPM_J_1.4.12
IPM_J_1.4.12IPM_J_1.4.12
IPM_J_1.4.12
 
HSM_J_1.4.12
HSM_J_1.4.12HSM_J_1.4.12
HSM_J_1.4.12
 
CGS_J_1.4.12
CGS_J_1.4.12CGS_J_1.4.12
CGS_J_1.4.12
 
CGS_J_20.3.12
CGS_J_20.3.12CGS_J_20.3.12
CGS_J_20.3.12
 
IPM_J_20.3.12
IPM_J_20.3.12IPM_J_20.3.12
IPM_J_20.3.12
 
HSM_J_20.3.12
HSM_J_20.3.12HSM_J_20.3.12
HSM_J_20.3.12
 
IPM_J_19.3.12
IPM_J_19.3.12IPM_J_19.3.12
IPM_J_19.3.12
 
IRM_J_19.3.12
IRM_J_19.3.12IRM_J_19.3.12
IRM_J_19.3.12
 
CGS_J_19.3.12
CGS_J_19.3.12CGS_J_19.3.12
CGS_J_19.3.12
 
IRM_J_19.3.12
IRM_J_19.3.12IRM_J_19.3.12
IRM_J_19.3.12
 

Último

A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 

Último (20)

A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 

IRM_E_19.3.12

  • 1. Quick Solution Delivery Offered by Knowledge IT Industry Wise Solutions Patent & Intellectual Manufacturing Medical & Health care Beauty & care Education Oil and energy Property Industry Industry Industry Industry Industry Electronics Franchising Industry Products Construction Public Utilities Government Industry Industry & Services Industry Knowledge IT Solutions 1. HR Strategy 2. Intellectual Property 3. Incident Response 4. Corporate Governance Management (HSM) Management (IPM) Management (IRM) Management (CGM) Knowledge IT Products Object Forensic Administration Project Review Manager (OM) Manager (FM) Manager (AM) Manager (PM) Manager (RM) Discovery Workflow Schedule Human Resource Corporate Manager (DM) Manager (WM) Manager (SM) Manager (HRM) Manager (CM) 2012 © Knowledge IT Corporation. All Rights Reserved
  • 2. Pick and Use Functions that you Need With any application, you effectively use only 10% of the application. But with Knowledge IT’s SaaS applications, you use only those functions that you need. The Knowledge IT Products Object Forensic Manager (OM) Manager (FM) Review Workflow Manager (RM) Manager (WM) Project Administration Manager (PM) Manager (AM) Human Resource Discovery (RM) Manager (HRM) Manager (DM) Corporate Schedule Manager (CM) Manager (SM) Easy Third Party Software Integration 2012 © Knowledge IT Corporation. All Rights Reserved
  • 3. Knowledge IT’s 4 Types of Application Based on Needs & User Demand Knowledge IT offers a variety of SaaS applications which do not require initial investment and installation effort, by providing easy-to-deploy software services at competitive pricing. The applications supports small businesses and large corporations, contributing to increasing effectiveness and reducing expenses. Professional Business Enterprise Ultimate Individuals・SOHO Small and Medium Small and Medium For large companies Personal Offices enterprises or Enterprises or looking for full control or Small Offices Shop owners Enterprise Subcontractors and autonomy Best for individual Suitable for system ranging Ideal for organizations and Highly specialized set of use and smaller from two to multiple users. businesses with large groups. administration tools in an businesses Data access for packaged Security, access privileges as application is ideal for large groups predetermined privilege based. well as functions can be of people in an organization. This Size: 1-5 Persons Secure user access. determined by the customer and Ultimate set comes with the freedom User: 1 Person set/added per category of users to build a solution view and dig- Size: 2-1000 Persons from Packaged Solution. down feature according to each User: 30 and above customer’s need. Role based as well Size: 100-1000 Persons as privilege based access control can User: 50 and above be set by the Business and above. Size: 100 Persons and above User: 100 and above 2012 © Knowledge IT Corporation. All Rights Reserved
  • 4. Folder Management 2012 © Knowledge IT Corporation. All Rights Reserved.
  • 5. Incident Search of Different Types Analyst Login User Login Incident Search Result 2012 © Knowledge IT Corporation. All Rights Reserved.
  • 6. Incident Registration User Login 2012 © Knowledge IT Corporation. All Rights Reserved.
  • 7. Incident Occurrence Notification Help Desk Manager Login Help Desk manager receive the incident registration alert mail He may also reply along and will assign it to the with any feedback or concerned analyst. suggestion. 2012 © Knowledge IT Corporation. All Rights Reserved.
  • 8. Incident List Analyst Login Analyst finds an incident assigned to him 2012 © Knowledge IT Corporation. All Rights Reserved.
  • 9. Add Follow Up Analyst Login Analyst can add follow up if required, to convey his message, to user regarding an incident. Different Index Description Form 2012 © Knowledge IT Corporation. All Rights Reserved.
  • 10. User Incident List User Login Icon of follow up added by analyst. User finds follow up attached by analyst. 2012 © Knowledge IT Corporation. All Rights Reserved.
  • 11. Incident Closure & Notification User Login Analyst Login User may report or give his acknowledgement on incident being resolved or follow up added by analyst. Analyst will find notification of user feedback on follow up via mail. 2012 © Knowledge IT Corporation. All Rights Reserved.
  • 12. Incident Modify Analyst Login Lock during modify by any user or analyst. 2012 © Knowledge IT Corporation. All Rights Reserved.
  • 13. Incident Copy User Login If the problem occurs again user may copy selected incident to required folder. 2012 © Knowledge IT Corporation. All Rights Reserved.
  • 14. On Demand Escalation Multiple escalations with various KPI’s can be set for multiple user. Mail escalated when defined criteria meets. 2012 © Knowledge IT Corporation. All Rights Reserved.