Accounts Payable: A Powerful Document Management and Workflow Solution

Accounts payable is just one area of office management where problems arise because of the sheer complexity of transactions, and the vast amount of paperwork that is generated.

A disproportionate amount of time and administrative resources is consumed just getting invoices approved for payment. The problem becomes compounded when invoices are lost when being circulated for clearance and even more time is then lost in the retrieval process.

Typically these documents include purchase invoices from suppliers, sales invoices to customers and purchase orders generated by customers.

Even if missing documentation is successfully recovered from the system, the delay will have caused major inconvenience. If it is not recovered, the effects on business are routinely disruptive, and in extreme cases, disastrous.

TokOpen is a powerful document management and workflow software solution that goes far beyond conventional document capture and storage. Uniquely flexible, the package allows systems to be configured to meet customers' specific needs.

How TokOpen works

Automated data entry allows invoices to be scanned, indexed and stored in the system, avoiding time-consuming manual entry. Automated reading can take two forms: either header reading (reference number, client name and amount); or full line item reading. Alternatively, invoice information can still be entered manually if required.

Once in the system, invoices are electronically routed through a workflow process that includes notifying all authorised staff when an invoice is waiting for their approval. Online reports are automatically generated where invoices awaiting approval are delayed or missing. These reports are configurable, so they can be set up to cover other factors critical to successful payment completion.

Internal security is built into the system, and access controls ensure that only authorised staff can open invoices or related documents. Audits are automatically maintained on all documents as they progress through the system, so each time they are accessed or amended, time, date, identity and activity details are logged.

Where associated documents are in the system, these are stored in the same file alongside invoices so they can be located quickly and easily. Access can be gained from other systems, in which case folders and documents are displayed in a standard Web browser.

Invoice approval is integrated with the rest of the accounts payable process, and invoices can be accessed via systems like SAP or JDE.

TokOpen in action ? a case study

TokOpen is currently being used by a major Japanese multi-national, with multiple office locations in the UK. One office processes purchase invoices for all the other offices in the UK, and they are initially processed using the Oracle Financials system. For all new invoices, a barcode is generated and attached to each document.

An Accounts Clerk then scans all documentation into TokOpen. This is carried out from a dedicated scanning and indexing workstation, using TokOpen Sorting Office.

All documents are stored here and then uploaded on a daily basis to the TokOpen server, which is at another UK office location. Sorting Office reads the barcode and then looks up the original data in Oracle to extract additional index data such as invoice number, supplier number and site code.

Standard browser access

Most documents are retrieved via the users' standard Web browser, using TokOpen Web, and a total of 260 staff use this means of access. A restricted number of users also have access to the TokOpen Desktop, and access is provided to individuals based on an approval hierarchy.

Invoices are handled using an efficient electronic workflow process. Once scanned, Invoice Status is set to Invoice Received. TokOpen ensures that users can only view documents that have been assigned to them in a particular workflow.

A strict authorisation hierarchy is in place, based on the size of the invoices being handled. So if a member of staff attempts to authorise an invoice that exceeds their authorisation limit, TokOpen automatically routes it to a staff member at the next authorisation level. This continues up the authorisation hierarchy until the invoice reaches a member of staff who has had clearance to sign off that invoice value, and payment is completed.

TokOpen brings together powerful and efficient document management, with easy-to-use, Web-based access.

Tokairo is an international provider of Document Management (TokOpen) and Education systems solutions (TokAM). Tokairo has its headquarters in the UK, with a sister company in the USA responsible for the Americas. http://www.tokairo.com REF=TO2EZ

In The News:

An artificial intelligence-powered home security system can fire paintballs and tear gas at trespassers. The camera identifies human faces and animals.
Technology expert Kim Komando gives her tips and tricks on enhancing your user experience a smartphone and other devices you use everyday.
A new camera called NUCA uses artificial intelligence to create deepfake photos of subjects by stripping away clothing in close to real time.
The Kimberley Kube trail-ready camper has a compact but spacious design and combines luxury, functionality and ruggedness for a weekend getaway.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Emails instructing you to reset your password for an account may be legitimate, or they may be scams. Kurt "CyberGuy" Knutsson explains.
Northrop Grumman's Manta Ray uncrewed underwater vehicle aims to revolutionize undersea missions — it glides through the ocean without human assistance.
Learn how to work Google's calendar application to streamline and organize your daily tasks from technology expert Kim Komando.
If you do not want Facebook to have automatic access to your private photos, follow our tips to protect yourself. Kurt “CyberGuy" Knutsson shows you how.
Kurt “CyberGuy" Knutsson goes into detail about Apple’s recent iOS update that allows iPhone users to instantly translate spoken language simply by using the Action Button.
Safeguarding your digital life with a reliable physical backup isn't just a precaution, it's a necessity. Kurt “CyberGuy" Knutsson provides the essential backup checklist.
Kurt “CyberGuy" Knutsson reveals how a Redditor exposed false recycling claims at their apartment, highlighting a report that only 21% of U.S. recyclables are processed.
Kurt "CyberGuy" Knutsson offers a travel toolkit featuring five technology tools to help you with booking flights and hotels for your summer vacation.
The bubble behind the clock on your iPhone can appear in different colors. Kurt "CyberGuy" Knutsson explains what each of those colors mean.
Scammers are using the power of artificial intelligence to mimic voices of people and are using the fake voices to commit crimes, like kidnappings.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Tech guru Kurt "CyberGuy" Knutsson explains the science behind the Invisibility Shield, a 6-foot shield that makes people become invisible.
The International Olympic Committee on Friday announced plans to use AI in various Olympic aspects, including athlete identification, training and judging.
Tech guru Kurt "CyberGuy" Knutsson explains an easy trick to avoid squinting while working or surfing the web by zooming in on your personal computer.
Streaming giant Roku has recently been targeted by a pair of cyberattacks, and the company confirmed over a half million Roku accounts were compromised.
The Land Aircraft Carrier combines an all-terrain, six-wheeled vehicle with a two-seat aircraft, which features electric vertical takeoff and landing.
The European Union has sent TikTok a "request for information" on the video sharing platform's newest app, TikTok Lite, under the Digital Services Act, with the aim to clean up social media.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
The FBI is warning the public about a recent phishing scam via text that claims its targets owe money in Pennsylvania for unpaid road toll charges.
Your Apple Music settings may be revealing to your contacts what you're listening to. Kurt "CyberGuy" Knutsson explains the process to change those settings.

OSI Layers Model

IntroductionDuring the early years of our modern computer era, very... Read More

Microsoft RMS Customization ? PO Items Receiving in Great Plains

Microsoft Retail Management (RMS) and Microsoft Great Plains are retail... Read More

Where to Find Free Fleet Maintenance Software

Costs of fleet maintenance software can vary widely. It is... Read More

Software Tools To Help Your Business Sell More

Sales are all about leverage, because there is only so... Read More

Microsoft C# vs. VB.Net

Hi, Guys,I believe a lot of programmers are trying to... Read More

Intro to UNIX Shells

A UNIX Shell is in simplest terms, a command line... Read More

Free Software: How Not To Get More Than You Bargained For!

I completed an experiment recently. I wanted to find out... Read More

Resume Software ? Advantages Revealed

The various resume software offered, particularly on the internet, can... Read More

CROOK: A Methodology for the Refinement of Forward-Error Correction

Table of Contents1) Introduction 2) Related Work 3) Framework 4)... Read More

The Software 2005 Conference - A Review

The Software 2005 conference is now a wrap. This conference,... Read More

RSS: Get Notified When Your Favorite Websites Are Updated

RSS (Really Simple Syndication) is a way for a site... Read More

Selecting Microsoft Great Plains Partner/VAR/Reseller: ERP Implementation & Customization ? Overview

In the case when you represent mid-size or mid-size-to-large business,... Read More

Microsoft Navision Database Selection: C/SIDE or MS SQL Server - Overview For IT Specialist

There are certain pluses and minuses in both cases and... Read More

Builders Beware

Which Type of Shop Can Rely On A Home Built... Read More

Windows x: Basic Windows ?Security? Issues

Language development computer: Computer-based method for aiding language development seems... Read More

Cisco Certification: Introduction To ISDN, Part III

Configuring PPP PAP AuthenticationNow we know how the ISDN link... Read More

The Truth: Netzero 3G

We've all seen the ads on TV for Netzero 3G.... Read More

Crystal Reports For Microsoft RMS ? Overview For Developer/Report Designer

If you are software developer or database administrator - we... Read More

Microsoft CRM Development

Microsoft CRM is CRM answer from Microsoft Business Solutions.The whole... Read More

The Truth about Colossus: Are You Just A Magnetic Image?

What is Colossus?Colossus is software licensed to about twenty-five insurance... Read More

A Guide To Purchasing Professional XP Icons Online And Enhancing Your Applications

Icons are used everywhere; right from software applications, to internet... Read More

PHP On-The-Fly!

IntroductionPHP can be used for a lot of different things,... Read More

A Symons Mark II Function Point Counting Example

I provide, here clear explanations and a count of function... Read More

Collaboration Software: Index of Collaboration Software Technologies

Collaboration SoftwareCollaboration Software, also known as group collaboration software or... Read More

Recovering Microsoft Great Plains Customization ? Tips for IT Director

Remember nice and prosperous Clinton era? When you implemented innovative... Read More