In the modern world, control systems, accounting for financial and commodity flows are one of the keys to the successful functioning of an enterprise of any size. It so happened that business automation on the 1C platform has become a kind of visiting card of organizations. Often a situation arises when, when applying for a job, the employer makes it an indispensable condition for applicants to own this package.
What is 1C platform
Initially, the developers positioned their product as a program to facilitate accounting. Over time, 1C has become an independent software shell with its own internal programming language. In addition to access to their own databases, this allows you to integrate the product with other programs using OLE and DDE technologies. Starting with version 7.7, the ability to use a COM connection from Microsoft has been added.
The client part of the program runs in the Microsoft Windows environment. Going to meet consumers, starting with version 8.3, the developers have implemented the possibility of functioning of the platform such as Mac OS X and Linux. It is also worth noting the existence of portable versions, which are very popular among small and medium-sized entrepreneurs.
Typical configurations of the 1C platform
Note that from a highly specialized accounting program, 1C is currently a powerful multifunctional platform for automating almost all business processes in an enterprise. The following typical configurations are available to users:
- trade management;
- salary and personnel management;
- manufacturing plant management;
- business management.
Given that the platform itself is modular, it is easily adaptable to the vision of any business. Through the use of an internal programming language, the functionality of the base configurations can be extended and combined with other similar applications.
Technical support of the platform is carried out depending on the type of license, which, as a rule, are purchased by the number of end users, to an enterprise server or to a separately formed configuration. Protection against piracy and unauthorized access is carried out through electronic or hardware HASP keys (available in expensive versions of the product).