Framework for classifying forms and processing form data

ABSTRACT

In response to a request received from a client device to view an item, a program determines a category associated with the item and a location associated with a user of the client device. The program also identifies a form based on the category and the location. The form comprises a set of fields. The program then provides a graphical user interface (GUI) that includes the form to the client device. The program also receives, through the GUI, data values for the set of fields from the client device and a request to add the item to a collection of items. The program then identifies a policy based on the category and the location. The program also applies the policy to the data values for the set of fields. The program then sends a notification to the client device indicating a result of the application of the policy.

CROSS-REFERENCE TO RELATED APPLICATION

This application is a continuation of U.S. patent application Ser. No.15/256,332, filed Sep. 2, 2016. The entire contents of U.S. patentapplication Ser. No. 15/256,332 is incorporated herein by reference inits entirety for all purposes. U.S. patent application Ser. No.15/256,332 claims the benefit and priority of U.S. ProvisionalApplication No. 62/307,358, filed Mar. 11, 2016, entitled “GuidedBuying,” the entire contents of which are incorporated herein byreference in its entirety for all purposes.

BACKGROUND

Today, enterprises have different processes in place for procuringdifferent goods and services. Many enterprises have a number ofdifferent systems for handling different stages of procurementprocesses. Different departments or employees may be responsible forhandling the different stages of the procurement processes. In addition,each stage may require a user to manually make selections, enterinformation into the system, etc. As such, procurement processes areoften tedious and cumbersome processes that require users to useseparate and disjointed systems in order to complete the procurementprocesses.

Enterprises will typically have a variety of policies in place for theitems that may be procured and the manner in which the items areprocured. Often times, employees wanting to procure items in anenterprise environment are not aware of and/or cannot find informationon policies that are applicable to the items. As a result, employees mayattempt to procure items that they are not allowed to procure or theemployees perform incorrect actions at various stages of the procurementprocesses, which leads to inefficient use and/or waste of time.

SUMMARY

In some embodiments, a non-transitory computer-readable medium stores aprograms executable by at least one processing unit. In response to arequest received from a client device to view an item, the programdetermines a category associated with the item and a location associatedwith a user of the client device. The program also identifies a formbased on the category and the location. The form comprises a set offields. The program then provides a graphical user interface (GUI) thatincludes the form to the client device. The program also receives,through the GUI, data values for the set of fields from the clientdevice and a request to add the item to a collection of items. Theprogram then identifies a policy based on the category and the location.The program also applies the policy to the data values for the set offields. The program then sends a notification to the client deviceindicating a result of the application of the policy.

In some embodiments, the policy is a first policy. The program furtherreceives a request for the item and requisition information associatedwith the item. In response to the request, the program then identifies asecond policy based on the category and the location. The program alsoapplies the second policy to the requisition information.

In some embodiments, the program determines that the result of theapplication of the policy is a violation of the policy. The program thenprevents the item from being added to the collection of items. In someembodiments, the program determines that the result of the applicationof the policy is a not violation of the policy. The program then addsthe item to the collection of items.

In some embodiments, the item is a first item, the category is a firstcategory, and the form is a first form comprising a first set of fields.In response to a request received from a client device to view a seconditem, the program further determines a second, different categoryassociated with the second item. The program also identifies a second,different form based on the second category and the location. The secondform comprises a second, different set of fields. The program alsoprovides the GUI that includes the second form to the client device.

In some embodiments, in response to a request received from a clientdevice to view an item, a method determines a category associated withthe item and a location associated with a user of the client device. Themethod also identifies a form based on the category and the location.The form comprises a set of fields. The method then provides a graphicaluser interface (GUI) that includes the form to the client device. Themethod also receives, through the GUI, data values for the set of fieldsfrom the client device and a request to add the item to a collection ofitems. The method then identifies a policy based on the category and thelocation. The method also applies the policy to the data values for theset of fields. The method then sends a notification to the client deviceindicating a result of the application of the policy.

In some embodiments, the method further receives a request for the itemand requisition information associated with the item. In response to therequest, the method may identify a second policy based on the categoryand the location. The method then applies the second policy to therequisition information.

In some embodiments, the method further determines that the result ofthe application of the policy is a violation of the policy. The methodalso prevents the item from being added to the collection of items. Insome embodiments, the method of further determines that the result ofthe application of the policy is a not violation of the policy. Themethod then adds the item to the collection of items.

In some embodiments, the item is a first item, the category is a firstcategory, and the form is a first form comprising a first set of fields.In response to a request received from a client device to view a seconditem, the method further determines a second, different categoryassociated with the second item. The method then identifies a second,different form based on the second category and the location. The secondform comprises a second, different set of fields. The method alsoprovides the GUI that includes the second form to the client device.

In some embodiments, a system includes a set of processing units and anon-transitory computer-readable medium that stores instructions. Inresponse to a request received from a client device to view an item, theinstructions cause at least one processing unit to determine a categoryassociated with the item and a location associated with a user of theclient device. The instructions also cause the at least one processingunit to identify a form based on the category and the location. The formcomprises a set of fields. The instructions then cause the at least oneprocessing unit to provide a graphical user interface (GUI) thatincludes the form to the client device. The instructions also cause theat least one processing unit to receive, through the GUI, data valuesfor the set of fields from the client device and a request to add theitem to a collection of items. The instructions then cause the at leastone processing unit to identify a policy based on the category and thelocation. The instructions also cause the at least one processing unitto apply the policy to the data values for the set of fields. Theinstructions then cause the at least one processing unit to send anotification to the client device indicating a result of the applicationof the policy.

In some embodiments, the instructions further cause the at least oneprocessing unit to receive a request for the item and requisitioninformation associated with the item. In response to the request, theinstructions cause the at least one processing unit to identify a secondpolicy based on the category and the location. The instructions alsocause the at least one processing unit to apply the second policy to therequisition information.

In some embodiments, the instructions further cause the at least oneprocessing unit to determine that the result of the application of thepolicy is a violation of the policy. The instructions also cause the atleast one processing unit to prevent the item from being added to thecollection of items. In some embodiments, the instructions further causethe at least one processing unit to determine that the result of theapplication of the policy is a not violation of the policy. Theinstructions then cause the at least one processing unit to add the itemto the collection of items.

In some embodiments, the item is a first item, the category is a firstcategory, and the form is a first form comprising a first set of fields.In response to a request received from a client device to view a seconditem, the instructions cause the at least one processing unit todetermine a second, different category associated with the second item.The instructions also cause the at least one processing unit to identifya second, different form based on the second category and the location,the second form comprising a second, different set of fields. Theinstructions then cause the at least one processing unit to provide theGUI that includes the second form to the client device.

The following detailed description and accompanying drawings provide abetter understanding of the nature and advantages of the presentinvention.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates an architecture of a procurement system according tosome embodiments.

FIG. 2 illustrates an example data flow through the system illustratedin FIG. 1 according to some embodiments.

FIG. 3 illustrates a graphical user interface (GUI) for selecting orsearching for a category according to some embodiments.

FIGS. 4A and 4B illustrate an example of a page that includes a form forprocuring an item according to some embodiments.

FIG. 5 illustrates another example data flow through the systemillustrated in FIG. 1 according to some embodiments.

FIG. 6 illustrates another example of a page that includes a form forprocuring an item according to some embodiments.

FIG. 7 illustrates an architecture of a buying manager according to someembodiments.

FIG. 8 illustrates a process for procuring items according to someembodiments.

FIG. 9 illustrates a process for processing policies according to someembodiments.

FIG. 10 illustrates an example location hierarchy according to someembodiments.

FIG. 11 illustrates an example category hierarchy according to someembodiments.

FIG. 12 illustrates example policies that are defined according to thehierarchies illustrated in FIGS. 10 and 11.

FIG. 13 illustrates an exemplary computer system, in which variousembodiments may be implemented

FIG. 14 illustrates system for implementing various embodimentsdescribed above.

DETAILED DESCRIPTION

In the following description, for purposes of explanation, numerousexamples and specific details are set forth in order to provide athorough understanding of the present invention. It will be evident,however, to one skilled in the art that the present invention as definedby the claims may include some or all of the features in these examplesalone or in combination with other features described below, and mayfurther include modifications and equivalents of the features andconcepts described herein.

Described herein are techniques for procuring items (e.g., goods and/orservices) from a variety of suppliers in a seamless and automated mannerIn some embodiments, a system is provided that implements suchtechniques. Policies may be defined for the system, which applies thepolicies to items requested to be procured. This way, the system maycontrol what items may be procured and the manner in which the items areprocured. Additionally, different types of policies may be defined forthe system, which applies the different types of policies at differentstages of procurement processes.

FIG. 1 illustrates an architecture of such a system 100 according tosome embodiments. As shown, system 100 includes procurement system 110,network 180, client devices 190 a-n, and storages 150-165. Network 180may be any type of network configured to facilitate data communicationsamong client devices 190 a-n and procurement system 110 using any of avariety of network protocols. Network 180 may be a personal area network(PAN), a local area network (LAN), a storage area network (SAN), acampus area network (CAN), a metropolitan area network (MAN), a widearea network (WAN), a global area network (GAN), an intranet, theInternet, a network of any number of different types of networks, etc.

Client devices 190 a-n are configured to access and communicate withprocurement system 110 via network 180. For instance, a user (e.g., anemployee, a buyer, etc.) may use a client device 190 to send a requestto procure an item to procurement system 110. As another example, a user(e.g., a supplier) may use a client device 190 to access requests forquotes (RFQs) that the user has received from another user (e.g., anemployee, a buyer, etc.).

As illustrated in FIG. 1, procurement system 110 includes buying manager115, supplier network manager 120, sourcing manager 125, procurementmanager 130, forms manager 135, supplier manager 140, catalog manager145, catalog storage 150, hierarchies storage 155, user profiles storage160, and policies storage 165.

Buying manager 115 serves as an interface through which buyers (e.g.,via client devices 190 a-n) communicate with procurement system 110.Buying manager 115 provides to client devices 190 a-n various graphicaluser interfaces (GUIs) for client devices 190 a-n to interact withprocurement system 110. For example, buying manager 115 may provide GUIsfor creating and managing policies and GUIs for viewing items toprocure. Buying manager 115 is also responsible for managing policiesfor procuring an item. For instance, buying manager 115 creates policies(which are stored in policies storage 165), identifies policiesassociated with an item requested to be procured, and applies policiesat various stages of procuring the item.

Supplier network manager 120 is configured to provide an interfacethrough which suppliers (e.g., via client devices 190 a-n) manage itemsthat suppliers are selling, RFQs for items, purchases of items receivedfrom buyers, invoices for purchased items, etc. Sourcing manager 125handles many of the RFQ operations (among other functions related to thesourcing of items) for procurement system 110. For example, sourcingmanager 125 may manage RFQ process templates. In some embodiments, anRFQ process template is associated with a particular item and specifiesinformation (e.g., price, availability, etc.) to request from a supplierin an RFQ of the item. As another example, sourcing manager 125 mayreceive requests to generate RFQs for a set of specified suppliers and,in response, generate RFQs for the specified suppliers.

Procurement manager 130 handles the requisition operations associatedwith the procurement of items. Procurement manager 130 is alsoresponsible for approval operations associated with the procurement ofitems. For example, in some instances, a user (e.g., an employee) mayrequest an item to be procured that requires approval from another user(e.g., a manager). In such instances, procurement manager 130 receives arequest from buying manager 115 to handle the approval of the item and,in response, sends a request for approval to the other user. Onceprocurement manager 130 receives a response from the other user,procurement manager 130 forwards the response to buying manager 115.

Forms manager 135 stores and manages forms that are used for procuringitems. In some embodiments, a form includes a set of fields and isassociated with a location, a category, and/or an item. The forms may beused to prompt a user for input (e.g., data values) for one or morefields in the set of fields. Procuring different category of items mayrequire different information, different forms may be defined fordifferent category of items. For instance, procuring a contractor mayrequire information such as employment history, years of experience,education, etc., while procuring database storing may requireinformation such as amount of storage space, type of storage, etc. Formsmanager 135 may store metadata associated with each of the forms. Forinstance, forms manager 135 may store, for each form, descriptions ofeach field specified in the form.

Supplier manager 140 is configured to identify suppliers from which toprocure items. In some embodiments, supplier manager 140 identifiessuppliers based on a location and the category to which the item that isto be procured belongs. A supplier may be specified as a preferredsupplier or a non-preferred supplier. As such, for a particular locationand category of an item, supplier manager 140 may identifier a set ofsuppliers that includes preferred suppliers and/or non-preferredsuppliers.

Catalog manager 145 is responsible for managing a catalog of items incatalog storage 150. In some embodiments, an item may be defined as agood, a service, or a combination of one or more goods and one or moreservices. For instance, an item may be defined as a machine and aservice to install the machine. Upon request, catalog manager 145retrieves items (e.g., a specific item, items associated with aparticular category, etc.) stored in catalog storage 150

Storages 150-165 are configured to store a variety of different data forprocurement system 110. Specifically, Catalog storage 150 is configuredto store a plurality of items that may be procured from suppliers. Insome embodiments, catalog storage 150 stores, for each item, a categoryassociated with the item, a description of the item, a supplier of theitem, a price of the item, whether the item requires RFQs, etc.Hierarchies storage 155 stores hierarchies that are used by the buyingmanager 115. For instance, hierarchies storage 155 may store a hierarchyof locations and a hierarchy of categories. Examples of such hierarchieswill be described below by reference to FIGS. 10 and 11. User profilesstorage 160 is configured to store information associated with users ofprocurement system 110. In some embodiments, user profiles storage 160stores, each user of procurement system 110, a location associated withthe user, a role of the user (e.g., an employee, a manager, etc.), amongother information associated with the user.

Policies storage 165 stores policies that are used during various stagesof procuring an item. In some embodiments, a policy specifies a type, alocation, a category, and a rule. In some such embodiments, the type ofa policy may be specified as one of several types: a shopping policy, anRFQ policy, or a requisition policy. Shopping policies may be appliedduring the viewing and selection stages of procuring items. RFQ policiesmay be applied during the RFQ stage of procuring items. Requisitionpolicies may be applied during the requisition stage of procuring items.In some embodiments, the rule of a policy may specify a set ofconditions that are applied to input data (e.g., data values of one ormore fields in a form, data associated with a user, data associated withan item, requisition data, etc.) and a set of operations that areperformed if the set of conditions are satisfied. A set of conditions ofa rule of a policy may specify that a user may provide data values ofone or more fields in a form. Alternatively, a set of conditions of arule of a policy may specify that a user may provide data values of oneor more fields in a form, but a different must approve the data valuesof one or more fields in the form. Examples of operations that may bespecified for a rule of a policy include sending a notification (alsoreferred to as a warning rule), sending a notification and requestingfor additional info (also referred to as a soft stop rule), and/ordenying a request to procure an item (also referred to as a hard stoprule).

Storages 150-165 may be implemented as separate physical storages, as asingle physical storage, or as a combination thereof. In addition,storages 150-165 may be implemented using any number of differentstorage technologies (e.g., databases, file systems, distribute datastores, etc.). While FIG. 1 shows storages 150-165 as external toprocurement system 110, in some embodiments, some or all of storages150-165 may be included in procurement system 110.

FIG. 2 illustrates an example data flow through the system illustratedin FIG. 1 according to some embodiments. Specifically, FIG. 2illustrates a data flow of a user using procurement system 110 to viewand select an item for procurement according some embodiments. The dataflow starts by a user (e.g., a buyer) sending, at operation 205, arequest for a category page that includes items associated with thecategory to buying manager 115. As shown, the user is sending therequest from client device 190 b. The request may be sent through a GUIpresented on client device 190 b that allows the user to select acategory or input text (e.g., keywords) to search for a category.

FIG. 3 illustrates an example of such a GUI. In particular, FIG. 3illustrates GUI 300, which includes selectable UI items 305-345 and UIcontrol 350. Selectable UI items 305-345 each represents a differentcategory, upon selection, causes GUI 300 to navigate to a page of itemsassociated with the corresponding category. UI control 350 is configuredto receive text input and includes selectable item 355 that, whenselected, causes GUI 300 to perform a search for a set of category pagesbased on the text input. For this example, the user selects selectableUI item 310, which represents an IT/telecom equipment category.

Returning to FIG. 2, upon receiving the request from client device 190b, buying manager 115 instructs, at operation 210, catalog manager 145to identify items in catalog storage 150 that are associated with theselected category. In response, catalog manager 145 returns, atoperation 215, the requested items to buying manager 115. Buying manager115 then generates a page that includes the identified items and sends,at operation 220, the page to client device 190 b for client device 190b to present on a display of client device 190 b. Next, the user mayselect to view an item in the page presented on client device 190 b.Upon receiving the selection from the user, client device 190 b sends,at operation 225, a request to view the selected item to buying manager115.

In response to the request, buying manager 115 identifies, by accessinguser profiles storage 160, a location associated with the user andidentifies, by accessing catalog storage 150, a category associated withthe item requested for viewing. Next, buying manager 115 sends, atoperation 230, to forms manager 135 the location, category, and item aswell as a request for a form. Forms manager 135 identifies a form basedon the location, category, and/or item and sends, at operation 235, theform to buying manager 115. Once receiving the form, buying manager 115generates a page that includes the form and sends, at operation 240, thegenerated page to client device 190 b for client device 190 b to presenton the display of client device 190 b.

FIG. 4A illustrates an example of a page that includes a form forprocuring an item according to some embodiments. Specifically, FIG. 4Aillustrates a GUI 400 for procuring a good, which in this example is awireless keyboard. GUI 400 includes display area 405, form 410, andselectable UI item 415. Display area 405 is for displaying informationabout the item (an image of the item and a text description of the itemin this example). Form 410 includes UI controls 420-430. UI controls 420and 425 are configured to receive text input for a “reason forprocurement” field and a “quantity” field, respectively. UI control 430is configured to automatically calculate and display a value for a“price” field based on the value provided for the “quantity” field. UIitem 415 is configured to send a request to procure the item uponselection of UI item 415.

Returning to FIG. 2, the user may provide input for the fields of theform and then send, at operation 245, buying manager 115 a request toadd the item to a collection of items to procure (e.g., a shoppingcart). Upon receiving the request, buying manager 115 accesses policiesstorage 165 to identify a set of shopping policies based on the locationassociated with the user and the category associated with the item.Buying manager 115 applies the identified shopping policies to thevalues of the fields of the form. If a shopping policy is violated,buying manager 115 performs operations (e.g., send the user anotification, prevent the item from being added to the collection ofitems to procure, prompt the user for additional information, etc.)specified in the rule of the shopping policy and sends, at operation250, client device 190 b a notification indicating that a violation ofthe policy has occurred. If no shopping policies are violated, buyingmanager 115 adds the item to the collection of items to procure andsends, at operation 250, client device 190 b a notification that theitem has been successfully added to the collection of items to procure.

FIG. 4B illustrates GUI 400 after a user has provided input for the formaccording to some embodiments. As shown, a user has provided text inputfor UI controls 420 and 425 of form 410. For this example, the user hasentered “gift” in UI control 420 and “1” in UI control 425. FIG. 4B alsoillustrates GUI 400 after the user has selected UI item 415 to send arequest to procure the item. Upon receiving the request from the uservia client device 190 b, buying manager 115 identifies a policy (basedon the location associated with the user and the category associatedwith the item) that prevents users from procuring goods valued over $30as gifts. Buying manager 115 then applies the policy to the valuesprovided in form 405. Since the price of the wireless keyboard is over$30 in this example, buying manager 115 prevents the user from procuringthe item and sends a notification 430 to client device 190 b via GUI 400indicating that the item may not be procured.

FIG. 5 illustrates another example data flow through the systemillustrated in FIG. 1 according to some embodiments. Specifically, FIG.5 illustrates a data flow of a user using procurement system 110 to viewand select an item for procurement that requires RFQs according someembodiments. Operations 505-535 are the same as operations 205-235described above for the data flow illustrated in FIG. 2. Continuingafter operation 535, once buying manager 115 receives the form fromforms manager 135, buying manager 115 determines, by accessing catalogstorage 150 to look up information associated with the item, that therequested item requires RFQs. In response to the determination, buyingmanager 115 sends, at operation 540, supplier manager 140 the item (or areference to the item such as an identifier that represents the item)and a request for a set of suppliers of the item. In response to therequest, supplier manager 140 identifies a set of suppliers based on theitem and returns, at operation 545, the set of suppliers to buyingmanager 115. Buying manager 115 then generates a page that includes theform as well as the set of suppliers and sends, at operation 550, thegenerated page to client device 190 b for client device 190 b to presenton the display of client device 190 b. The user may provide input (e.g.,data values) for the fields of the form and select one or more suppliersfrom the set of suppliers.

FIG. 6 illustrates another example of a page that includes a form forprocuring an item according to some embodiments. Specifically, FIG. 6illustrates a GUI 600 that includes form 605 for procuring a service toredesign for a conference room. As shown form 605 includes UI controls610-630 and selectable UI items 635-645. UI controls 610-630 areconfigured to receive text input for a variety of fields (e.g., title,request on behalf of, need by date, service, location, building, room,etc.). Selectable UI item 635 is configured to invoke, upon selection, afeature for adding an attachment to form 605. Selectable UI item 640 isconfigured to save, upon selection a draft of the procurement request(e.g., the data values provided for the fields in form 605 and/orselections of suppliers). Selectable UI item 645 is configured to send,upon selection, buying manager 115 a request to send RFQs to theselected suppliers. As shown in FIG. 6, in this example, the user hasalready provided text input for UI controls 610-630 of form 605 andselected three suppliers (one preferred supplier and two non-preferredsuppliers) from which RFQs are to be requested.

Returning to FIG. 5, the user may send, at operation 555, buying manager115 a request to send RFQs for the item to the selected suppliers. Uponreceiving the request, buying manager 115 accesses policies storage 165to identify a set of RFQ policies based on the location associated withthe user and the category associated with the item. Buying manager 115applies the identified RFQ policies to the values of the fields of theform. If an RFQ policy is violated, buying manager 115 performsoperations (e.g., send the user a notification, prevent the user fromprocuring the item, prompt the user for additional information, etc.)specified in the rule of the RFQ policy. For example, buying manager 115may send, at operation 250, client device 190 b a notificationindicating a violation of the policy. For instance, an RFQ policy mayrequire that the user select a minimum number of suppliers for RFQs andbuying manager 115 may send client device 190 b a notificationindicating so if such a policy is violated. If no RFQ policies areviolated, buying manager 115 sends, at operation 560, sourcing manager125 a request to process the RFQ requests for the selected set ofsuppliers.

Upon receiving the request, sourcing manager 125 determines informationto request from suppliers (e.g., price, availability, etc.) in the RFQs.In some embodiments, sourcing manager 125 determines such information byidentifying an RFQ process template associated with the item from theRFQ process templates managed by sourcing manager 125 and identifyingthe information specified in the RFQ process template. Sourcing manager125 then generates an RFQ that requests such information for each of theselected suppliers and sends, at operation 565, the RFQs to suppliernetwork manager 120, which sends each of the suppliers a notificationindicating that the supplier has received an RFQ. Once supplier networkmanager 120 receives the requested information for the RFQs from theselected suppliers, supplier network manager 120 forwards, at operation570, the information to buying manager 115. Buying manager 115 may thensend, at operation 575, client device 190 b the RFQ information from thesuppliers for client device 190 b to present on a display of clientdevice 190 b. The user may now select a supplier to use to procure theitem and send, at operation 580, buying manager 115 a request to procurethe item using the selected supplier. In response, buying manager 115adds the item to a collection of items to procure (e.g., a shoppingcart) and sends, at operation 585, client device 190 b a notificationthat the item has been successfully added to the collection of items toprocure.

Although FIGS. 3, 4, and 6 illustrates UI controls for receiving textinput, one of ordinary skill in the art will understand that additionaland/or different types of UI controls configured to receive input may beused in some embodiments. For instance, checkboxes, radio buttons,drop-down lists, etc. may be used. In addition, the example data flowsdescribed above by reference to FIGS. 2 and 5 illustrate separateexamples applying a shopping policy to an item and applying an RFQpolicy to an item, respectively. One of ordinary skill in the art willappreciate that one or more shopping policies and/or one or more RFQpolicies may be applied to an item during the procurement process of theitem in some embodiments.

FIGS. 2 and 5 illustrate examples of adding items to a collection ofitems to procure. In some instances, a user may request to procure theitems in the collection of items. In such instances, buying manager 115may receive from a client device (e.g., client device 190 b) a requestto procure items in the collection of items and requisition information.Examples of requisition information include a shipping address,accounting information, a reason for purchase, payment information,supplier information, etc.

For each item in the collection of items, buying manager 115 accesspolicies storage 165 to identify requisition policies based on thelocation associated with the user and the category associated with theitem. Buying manager 115 then applies the requisition policies torequisition information. If a requisition policy is violated, buyingmanager 115 performs operations (e.g., send the user a notification,prevent the user from procuring the item, prompt the user for additionalinformation, etc.) specified in the rule of the requisition policy. Ifno requisition policies are violated, buying manager 115 sendsprocurement manager 130 a request to process the requisition of theitems in the collection.

FIG. 7 illustrates an architecture of buying manager 115 according tosome embodiments. As shown, buying manager 115 includes application 705,page manager 710, administration manager 715, and policy engine 720.Application 705 is an application through which buyers (e.g., via clientdevices 190 a-n) access procurement system 110. In particular,application 705 provides various interfaces (e.g., GUIs such as GUI 300,400, and 600) that allow buyers to interact with procurement system 110.Application 705 may receive pages generated by page manager 710 andprovide such pages to client devices 190 a-n.

Page manager 710 is configured to generate pages for application 705 topresent to client devices 190 a-n. For instance, when page manager 710receives a request from application 705 to generate a page for acategory of items, page manager 710 requests catalog manager 145 foritems that are associated with the requested category and generates apage that includes the items received from catalog manager 145. Asanother example, page manager 710 may receive a request from application705 to generate a pager for a particular item. In such instances, pagemanager 710 requests catalog manager 145 for information associated withthe item and requests forms manager 135 for a form associated with theitem. Page manager 710 then generates a page that includes theinformation associated with the item and the form and forwards thegenerated page to application 705.

Administration manager 715 is responsible for creating and managingpolicies. For example, administration manager 715 may receive a requestfrom application 705 to create a policy. In response to such a request,administration manager generates the policy and stores the policy inpolicies storage 165. When administration manager 715 receives a requestfrom application 705 to modify or delete a policy, administrationmanager 715 accesses policies storage 165 to perform the requestedoperation.

Policy engine 720 is configured to identify policies associated with anitem and apply policies at various stages of procuring the item. Forexample, policy engine 720 may receive a request from application 705 toprocess policies for a particular item. In response to such a request,policy engine may access policies storage 165 to identify policiesassociated with the item based on a location associated with a user thatis requesting procurement of the item and a category associated with theitem. Policy engine 720 may then apply the identified policies to theitem and send application 705 results of the application of thepolicies.

FIG. 8 illustrates a process 800 for procuring items according to someembodiments. In some embodiments, buying manager 115 performs process800 when buying manager 115 receives a request to procure an item.Process 800 starts by receiving, at 810, a request from a device to viewan item. In some embodiments, the request may be received in response toa selection of an item in a page of items associated with a particularcategory.

Next, process 800 identifying, at 820, a form based on a locationassociated with a user of the device and a category associated with theitem. In some embodiments, process 800 determines the locationassociated with the user of the device by accessing a storage (e.g.,user profiles storage 160) that contains information associated with theuser. Process 800 may determine the category associated with the item byaccessing a storage (e.g., catalog 150) that contains informationassociated with the item. As mentioned above, a form includes a set offields.

Process 800 then provides, at 830, a page that includes the identifiedform to the device. Referring to FIG. 4B as an example, GUI 400 includesform 405 that is provided to a user of a client device. Next, process800 receives, at 840, from the device input for the fields in the formand a request to add the item to a collection of items to procure. Insome embodiments, process 800 receives the input for the fields in theform and the request via a GUI (e.g., GUI 400) through which the userprovides input and sends the request.

In response to the request, process 800 identifies, at 850, a set ofpolicies based on the location associated with the user of the deviceand the category associated with the item. As described above, a policymay specify a type, a location, a category, and a rule. In someembodiments, process 800 identifies the set of policies by accessing astorage (e.g., policies storage 165) and identifying policies having alocation that matches the location associated with the user and acategory that matches the category associated with the item.

Next, process 800 applies, at 860, the set of policies to the inputs forthe fields in the form. Referring to FIG. 4B as an example, buyingmanager 115 applies a policy that does not allow gifts of goods valuedover $30 to be procured to the data values specified in UI controls 410and 430. Finally, process 800 sends, at 870, a notification to thedevice indicating the result of the application of the policy.Continuing with the example in FIG. 4B, buying manager 115 sends clientdevice 190 b a notification indicating that a gift of an item with aprice over 30 may not be procured since applying the policy to thefields in form 405 resulted in violation of the policy.

FIG. 9 illustrates a process 900 for processing policies according tosome embodiments. In some embodiments, process 900 is performed as partof operation 850 of process 800. Policy engine 720 may perform process900. Process 900 will be described by reference to FIGS. 10-12. FIG. 10illustrates an example location hierarchy 1000 according to someembodiments. As shown, location hierarchy 1000 has three levels. Atlevel 1 of location hierarchy 1000 is a node that represents UnitedStates and has a node identifier of 01. Level 2 of location hierarchy1000 includes two child nodes of the node that represents United States:a node that represents California, which has a node identifier of 01,and a node that represents Nevada, which has a node identifier of 02.Level 3 includes two child nodes of the node that represents California:a node that represents Los Angeles, which has a node identifier of 01,and a node that represents Palo Alto, which has a node identifier of 02.Level 3 also includes two child nodes of the node that representsNevada: a node that represents Las Vegas, which has a node identifier of01, and a node that represents Reno, which has a node identifier of 02.As shown in FIG. 10, nodes that are at the same level and belong to thesame parent node have different node identifiers.

FIG. 11 illustrates an example category hierarchy 1100 according to someembodiments. As shown, category hierarchy 1100 has three levels. Atlevel 1 of category hierarchy 1100 is a node that represents ITequipment and has a node identifier of 01. Level 2 of location hierarchy1000 includes two child nodes of the node that represents IT equipment:a node that represents computer hardware, which has a node identifier of01, and a node that represents computer software, which has a nodeidentifier of 02. Level 3 includes two child nodes of the node thatrepresents computer hardware: a node that represents laptop, which has anode identifier of 01, and a node that represents desktop, which has anode identifier of 02. Level 3 also includes child node of the node thatrepresents computer software: a node that represents image editor, whichhas a node identifier of 01. As shown in FIG. 11, nodes that are at thesame level and belong to the same parent node have different nodeidentifiers.

FIG. 12 illustrates example policies that are defined according to thehierarchies illustrated in FIGS. 10 and 11. Specifically, FIG. 12 showsa table 1200 of six policies. Each policy has a location field, acategory field, a type field, and a rule field. As explained above, apolicy specifies a type, a location, a category, and a rule, in someembodiments. In this example, the value (also referred to as anidentifier encoding) in the location field of a policy represents aparticular node in location hierarchy 1000. The value is determined byconcatenating the node identifiers of nodes along the traversal path tothe particular node. For example, the location field of the first policyspecifies the Palo Alto node in location hierarchy 1000. The value010102 is the concatenation of the node identifiers of the nodes alongthe path to Palo Alto, which in this case is the concatenation of thenode identifier that represents United States (01), the node identifierthat represents California (01), and the node identifier that representsPalo Alto (02). Similarly, the value (also referred to as an identifierencoding) in the category field in a policy represents a particular nodein category hierarchy 1100. The value is determined by concatenating thenode identifiers of nodes along the traversal path to the particularnode. For example, the category field of the first policy specifies thelaptop node in category hierarchy 1100. The value 010101 is theconcatenation of the node identifiers of the nodes along the path tolaptop, which in this case is the concatenation of the node identifierthat represents IT equipment (01), the node identifier that representscomputer hardware (01), and the node identifier that represents laptop(01).

According to the techniques described above for encoding the locationfield and the category field, the second policy specifies California forthe location field and computer software for the category field, thethird policy specifies Palo Alto for the location field and computerhardware for the category field, the fourth policy specifies Californiafor the location field and computer hardware for the category field, thefifth policy specifies Nevada for the location field and computerhardware for the category field, and the sixth policy specifies UnitedStates for the location field and computer hardware for the categoryfield. The same techniques are utilized for encoding the location andthe category in the example described below.

Returning to FIG. 9, process 900 begins by receiving, at 910, a requestto process policies for an item based on a location associated with auser and a category associated with the item. As an example, process 900may receive a request to process shopping policies for an item that isrequested by a user located in Palo Alto and is associated with thecomputer hardware category.

Next, process 900 determines, at 920, an identifier encoding for thelocation based on a location hierarchy and an identifier encoding forthe category based on a category hierarchy. Continuing with the exampleabove, process 900 determines that the identifier encoding for Palo Altois 010102 and the identifier encoding for computer hardware is 0101.

Process 900 then determines, at 930, a first set of search identifiersbased on the identifier encoding for the location. In some embodiments,the first set of search identifiers includes the identifier encoding ofeach node in the traversal path to the location in the locationhierarchy. Continuing with the example above, the first set of searchidentifiers for Palo Alto includes three identifier encodings of thethree nodes in the traversal path to Palo Alto in location hierarchy1000, United States (01), California (0101), and Palo Alto (010102).

Next, process 900 determines, at 940, a second set of search identifiersbased on the identifier encoding for the category. In some embodiments,the second set of search identifiers includes the identifier encoding ofeach node in the traversal path to the category in the categoryhierarchy. Continuing with the example above, the second set of searchidentifiers for computer hardware includes two identifier encodings ofthe two nodes in the traversal path to computer hardware in categoryhierarchy 1100: IT equipment (01) and computer hardware (0101).

Process 900 then determines, at 950, a set of combinations of searchidentifiers based on the first and second sets of search identifiers. Insome embodiments, the set of combinations of search identifiers includesevery distinct combination of a search identifier from the first set ofsearch identifiers and a search identifier form the second set of searchidentifiers. Continuing with the example above, the set of combinationsof search identifiers are illustrated in the following Table 1:

TABLE 1 Location Category 01 01 01 0101 0101 01 0101 0101 010102 01010102 0101

Finally, process 900 identifies, at 960, a set of policies based on theset of combinations of search identifiers. In some embodiments, process900 identifies the set of policies by searching through policies (e.g.,policies stored in policies storage 165) and including a particularpolicy in the set of policies when the location and the category of theparticular policy matches a combination of search identifiers in the setof combinations of search identifiers. Continuing with the exampleabove, process 900 identifies the third policy in policy table 1200because the location and category of the third policy matches the sixthcombination of search identifiers in Table 1 and the policy type is ashopping policy. Process 900 also identifies the fourth policy in policytable 1200 because the location and category of the third policy matchesthe fourth combination of search identifiers in Table 1 and the policytype is a shopping policy. While the location and category of the sixthpolicy in policy table 1200 matches the second combination of searchidentifiers in Table 1, process 900 does not include the six policybecause the policy type of the sixth policy is not a shopping policy.

FIG. 13 illustrates an exemplary computer system 1300, in which variousembodiments may be implemented. For example, computer system 1300 may beused to implement client devices 190 a-n and procurement system 110described above by reference to FIGS. 1, 2, and 5. Computer system 1300may be a desktop computer, a laptop, a server computer, or any othertype of computer system or combination thereof. Some or all elements ofprocurement system 110 or combinations thereof can be included orimplemented in computer system 1300. In addition, computer system 1300can implement many of the operations, methods, and/or processesdescribed above (e.g., process 800 and process 900). As shown in FIG.13, computer system 1300 includes processing subsystem 1302, whichcommunicates, via bus subsystem 1302, with input/output (I/O) subsystem1308, storage subsystem 1310 and communication subsystem 1324.

Bus subsystem 1302 is configured to facilitate communication among thevarious components and subsystems of computer system 1300. While bussubsystem 1302 is illustrated in FIG. 13 as a single bus, one ofordinary skill in the art will understand that bus subsystem 1302 may beimplemented as multiple buses. Bus subsystem 1302 may be any of severaltypes of bus structures (e.g., a memory bus or memory controller, aperipheral bus, a local bus, etc.) using any of a variety of busarchitectures. Examples of bus architectures may include an IndustryStandard Architecture (ISA) bus, a Micro Channel Architecture (MCA) bus,an Enhanced ISA (EISA) bus, a Video Electronics Standards Association(VESA) local bus, a Peripheral Component Interconnect (PCI) bus, aUniversal Serial Bus (USB), etc.

Processing subsystem 1302, which can be implemented as one or moreintegrated circuits (e.g., a conventional microprocessor ormicrocontroller), controls the operation of computer system 1300.Processing subsystem 1302 may include one or more processors 1304. Eachprocessor 1304 may include one processing unit 1306 (e.g., a single coreprocessor such as processor 1304-1) or several processing units 1306(e.g., a multicore processor such as processor 1304-2). In someembodiments, processors 1304 of processing subsystem 1302 may beimplemented as independent processors while, in other embodiments,processors 1304 of processing subsystem 1302 may be implemented asmultiple processors integrate into a single chip or multiple chips.Still, in some embodiments, processors 1304 of processing subsystem 1302may be implemented as a combination of independent processors andmultiple processors integrated into a single chip or multiple chips.

In some embodiments, processing subsystem 1302 can execute a variety ofprograms or processes in response to program code and can maintainmultiple concurrently executing programs or processes. At any giventime, some or all of the program code to be executed can reside inprocessing subsystem 1302 and/or in storage subsystem 1310. Throughsuitable programming, processing subsystem 1302 can provide variousfunctionalities, such as the functionalities described above byreference to process 800 and process 900, etc.

I/O subsystem 1308 may include any number of user interface inputdevices and/or user interface output devices. User interface inputdevices may include a keyboard, pointing devices (e.g., a mouse, atrackball, etc.), a touchpad, a touch screen incorporated into adisplay, a scroll wheel, a click wheel, a dial, a button, a switch, akeypad, audio input devices with voice recognition systems, microphones,image/video capture devices (e.g., webcams, image scanners, barcodereaders, etc.), motion sensing devices, gesture recognition devices, eyegesture (e.g., blinking) recognition devices, biometric input devices,and/or any other types of input devices.

User interface output devices may include visual output devices (e.g., adisplay subsystem, indicator lights, etc.), audio output devices (e.g.,speakers, headphones, etc.), etc. Examples of a display subsystem mayinclude a cathode ray tube (CRT), a flat-panel device (e.g., a liquidcrystal display (LCD), a plasma display, etc.), a projection device, atouch screen, and/or any other types of devices and mechanisms foroutputting information from computer system 1300 to a user or anotherdevice (e.g., a printer).

As illustrated in FIG. 13, storage subsystem 1310 includes system memory1312, computer-readable storage medium 1320, and computer-readablestorage medium reader 1322. System memory 1312 may be configured tostore software in the form of program instructions that are loadable andexecutable by processing subsystem 1302 as well as data generated duringthe execution of program instructions. In some embodiments, systemmemory 1312 may include volatile memory (e.g., random access memory(RAM)) and/or non-volatile memory (e.g., read-only memory (ROM),programmable read-only memory (PROM), erasable programmable read-onlymemory (EPROM), electrically erasable programmable read-only memory(EEPROM), flash memory, etc.). System memory 1312 may include differenttypes of memory, such as static random access memory (SRAM) and/ordynamic random access memory (DRAM). System memory 1312 may include abasic input/output system (BIOS), in some embodiments, that isconfigured to store basic routines to facilitate transferringinformation between elements within computer system 1300 (e.g., duringstart-up). Such a BIOS may be stored in ROM (e.g., a ROM chip), flashmemory, or any other type of memory that may be configured to store theBIOS.

As shown in FIG. 13, system memory 1312 includes application programs1314, program data 1316, and operating system (OS) 1318. OS 1318 may beone of various versions of Microsoft Windows, Apple Mac OS, Apple OS X,Apple macOS, and/or Linux operating systems, a variety ofcommercially-available UNIX or UNIX-like operating systems (includingwithout limitation the variety of GNU/Linux operating systems, theGoogle Chrome® OS, and the like) and/or mobile operating systems such asApple iOS, Windows Phone, Windows Mobile, Android, BlackBerry OS,Blackberry 10, and Palm OS, WebOS operating systems.

Computer-readable storage medium 1320 may be a non-transitorycomputer-readable medium configured to store software (e.g., programs,code modules, data constructs, instructions, etc.). Many of thecomponents (e.g., buying manager 115, supplier network manager 120,sourcing manager 125, procurement manager 130, forms manager 135,supplier manager 140, and catalog manager 145) and/or processes (e.g.,process 800 and process 900) described above may be implemented assoftware that when executed by a processor or processing unit (e.g., aprocessor or processing unit of processing subsystem 1302) performs theoperations of such components and/or processes. Storage subsystem 1310may also store data used for, or generated during, the execution of thesoftware.

Storage subsystem 1310 may also include computer-readable storage mediumreader 1322 that is configured to communicate with computer-readablestorage medium 1320. Together and, optionally, in combination withsystem memory 1312, computer-readable storage medium 1320 maycomprehensively represent remote, local, fixed, and/or removable storagedevices plus storage media for temporarily and/or more permanentlycontaining, storing, transmitting, and retrieving computer-readableinformation.

Computer-readable storage medium 1320 may be any appropriate media knownor used in the art, including storage media such as volatile,non-volatile, removable, non-removable media implemented in any methodor technology for storage and/or transmission of information. Examplesof such storage media includes RAM, ROM, EEPROM, flash memory or othermemory technology, compact disc read-only memory (CD-ROM), digitalversatile disk (DVD), Blu-ray Disc (BD), magnetic cassettes, magnetictape, magnetic disk storage (e.g., hard disk drives), Zip drives,solid-state drives (SSD), flash memory card (e.g., secure digital (SD)cards, CompactFlash cards, etc.), USB flash drives, or any other type ofcomputer-readable storage media or device.

Communication subsystem 1324 serves as an interface for receiving datafrom, and transmitting data to, other devices, computer systems, andnetworks. For example, communication subsystem 1324 may allow computersystem 1300 to connect to one or more devices via a network (e.g., apersonal area network (PAN), a local area network (LAN), a storage areanetwork (SAN), a campus area network (CAN), a metropolitan area network(MAN), a wide area network (WAN), a global area network (GAN), anintranet, the Internet, a network of any number of different types ofnetworks, etc.). Communication subsystem 1324 can include any number ofdifferent communication components. Examples of such components mayinclude radio frequency (RF) transceiver components for accessingwireless voice and/or data networks (e.g., using cellular technologiessuch as 2G, 3G, 4G, 5G, etc., wireless data technologies such as Wi-Fi,Bluetooth, ZigBee, etc., or any combination thereof), global positioningsystem (GPS) receiver components, and/or other components. In someembodiments, communication subsystem 1324 may provide componentsconfigured for wired communication (e.g., Ethernet) in addition to orinstead of components configured for wireless communication.

One of ordinary skill in the art will realize that the architectureshown in FIG. 13 is only an example architecture of computer system1300, and that computer system 1300 may have additional or fewercomponents than shown, or a different configuration of components. Thevarious components shown in FIG. 13 may be implemented in hardware,software, firmware or any combination thereof, including one or moresignal processing and/or application specific integrated circuits.

FIG. 14 illustrates system 1400 for implementing various embodimentsdescribed above. For example, cloud computing system 1412 of system 1400may be used to implement procurement system 110. As shown, system 1400includes client devices 1402-1408, one or more networks 1410, and cloudcomputing system 1412. Cloud computing system 1412 is configured toprovide resources and data to client devices 1402-1408 via networks1410. In some embodiments, cloud computing system 1400 providesresources to any number of different users (e.g., customers, tenants,organizations, etc.). Cloud computing system 1412 may be implemented byone or more computer systems (e.g., servers), virtual machines operatingon a computer system, or a combination thereof.

As shown, cloud computing system 1412 includes one or more applications1414, one or more services 1416, and one or more databases 1418. Cloudcomputing system 1400 may provide applications 1414, services 1416, anddatabases 1418 to any number of different customers in a self-service,subscription-based, elastically scalable, reliable, highly available,and secure manner.

In some embodiments, cloud computing system 1400 may be adapted toautomatically provision, manage, and track a customer's subscriptions toservices offered by cloud computing system 1400. Cloud computing system1400 may provide cloud services via different deployment models. Forexample, cloud services may be provided under a public cloud model inwhich cloud computing system 1400 is owned by an organization sellingcloud services and the cloud services are made available to the generalpublic or different industry enterprises. As another example, cloudservices may be provided under a private cloud model in which cloudcomputing system 1400 is operated solely for a single organization andmay provide cloud services for one or more entities within theorganization. The cloud services may also be provided under a communitycloud model in which cloud computing system 1400 and the cloud servicesprovided by cloud computing system 1400 are shared by severalorganizations in a related community. The cloud services may also beprovided under a hybrid cloud model, which is a combination of two ormore of the aforementioned different models.

In some instances, any one of applications 1414, services 1416, anddatabases 1418 made available to client devices 1402-1408 via networks1410 from cloud computing system 1400 is referred to as a “cloudservice.” Typically, servers and systems that make up cloud computingsystem 1400 are different from the on-premises servers and systems of acustomer. For example, cloud computing system 1400 may host anapplication and a user of one of client devices 1402-1408 may order anduse the application via networks 1410.

Applications 1414 may include software applications that are configuredto execute on cloud computing system 1412 (e.g., a computer system or avirtual machine operating on a computer system) and be accessed,controlled, managed, etc. via client devices 1402-1408. In someembodiments, applications 1414 may include server applications and/ormid-tier applications (e.g., HTTP (hypertext transport protocol) serverapplications, FTP (file transfer protocol) server applications, CGI(common gateway interface) server applications, JAVA serverapplications, etc.) Services 1416 are software components, modules,application, etc. that are configured to execute on cloud computingsystem 1412 and provide functionalities to client devices 1402-1408 vianetworks 1410. Services 1416 may be web-based services or on-demandcloud services.

Databases 1418 are configured to store and/or manage data that isaccessed by applications 1414, services 1416, and/or client devices1402-1408. Databases 1418 may reside on a non-transitory storage mediumlocal to (and/or resident in) cloud computing system 1412, in astorage-area network (SAN), on a non-transitory storage medium locallocated remotely from cloud computing system 1412. In some embodiments,databases 1418 may include relational databases that are managed by arelational database management system (RDBMS). Databases 1418 may be acolumn-oriented databases, row-oriented databases, or a combinationthereof. In some embodiments, some or all of databases 1418 arein-memory databases. That is, in some such embodiments, data fordatabases 1418 are stored and managed in memory (e.g., random accessmemory (RAM)).

Client devices 1402-1408 are configured to execute and operate a clientapplication (e.g., a web browser, a proprietary client application,etc.) that communicates with applications 1414, services 1416, and/ordatabases 1418 via networks 1410. This way, client devices 1402-1408 mayaccess the various functionalities provided by applications 1414,services 1416, and databases 1418 while applications 1414, services1416, and databases 1418 are operating (e.g., hosted) on cloud computingsystem 1400. Client devices 1402-1408 may be computer system 1000.Although system 1400 is shown with four client devices, any number ofclient devices may be supported.

Networks 1410 may be any type of network configured to facilitate datacommunications among client devices 1402-1408 and cloud computing system1412 using any of a variety of network protocols. Networks 1410 may be apersonal area network (PAN), a local area network (LAN), a storage areanetwork (SAN), a campus area network (CAN), a metropolitan area network(MAN), a wide area network (WAN), a global area network (GAN), anintranet, the Internet, a network of any number of different types ofnetworks, etc.

The above description illustrates various embodiments of the presentinvention along with examples of how aspects of the present inventionmay be implemented. The above examples and embodiments should not bedeemed to be the only embodiments and are presented to illustrate theflexibility and advantages of the present invention as defined by thefollowing claims. Based on the above disclosure and the followingclaims, other arrangements, embodiments, implementations and equivalentswill be evident to those skilled in the art and may be employed withoutdeparting from the spirit and scope of the invention as defined by theclaims.

What is claimed is:
 1. A non-transitory computer-readable medium storinga program executable by at least one processing unit of a device, theprogram comprising instructions for: providing a set of items in agraphical user interface (GUI) to a client device; receiving, from theclient device, a selection of an item in the set of items provided inthe GUI; determining a category associated with the item and a locationassociated with a user of the client device; identifying a form from aplurality of forms based on the category and the location, the formcomprising a set of fields, wherein each form in the plurality of formsstores a category and a location, wherein the identified form stores thelocation associated with the user and the category associated with theitem; providing, through the GUI, the form to the client device;receiving, through the GUI, data values for the set of fields from theclient device and a request to add the item to a collection of items;determining a type of policy; accessing a storage configured to store aplurality of policies, each policy in the plurality of policiescomprising a location, a category, a type, and a rule, the rule of eachpolicy in the set of policies comprising a set of conditions and a setof operations to perform when the set of conditions are met;identifying, from the plurality of policies stored in the storage, apolicy having a location that matches the location associated with theuser of the client device, a category that matches the categoryassociated with the item, and a type that matches the type of policy;applying the policy to the data values for the set of fields; based onthe application of the policy, determining whether to allow the item tobe added to the collection of items; and sending a notification to theclient device indicating whether the item is allowed to be added to thecollection of items.
 2. The non-transitory computer-readable medium ofclaim 1, wherein the policy is a first policy, wherein the programfurther comprises instructions for: receiving a request for the item andrequisition information associated with the item; in response to therequest, identifying a second policy based on the category and thelocation; and applying the second policy to the requisition information.3. The non-transitory computer-readable medium of claim 1, whereindetermining whether to allow the item to be added to the collection ofitems comprises: upon determining that the item cannot be added to thecollection of items, preventing the item from being added to thecollection of items; upon determining that the item can be added to thecollection of items, adding the item to the collection of items.
 4. Thenon-transitory computer-readable medium of claim 1, wherein the locationof the policy matches the location associated with the user of theclient device and the category of the policy matches the categoryassociated with the item, wherein the set of conditions of the rule ofthe identified policy comprises a condition that a data value providedfor a field in the set of fields of the form is greater than a definedvalue, wherein the set of operations of the rule of the identifiedpolicy comprises an operation to provide a notification indicating thatan item cannot be procured.
 5. The non-transitory computer-readablemedium of claim 1, wherein determining the location associated with userof the client device comprises accessing a storage of the deviceconfigured to store a plurality of user profiles to identify thelocation associated with the user.
 6. The non-transitorycomputer-readable medium of claim 1, wherein determining the categoryassociated with the item comprises accessing a storage of the deviceconfigured to store a plurality of items to identify the categoryassociated with the item.
 7. The non-transitory computer-readable mediumof claim 1, wherein each item in the set of items is procurable from asupplier.
 8. The non-transitory computer-readable medium of claim 1,wherein applying the policy to the data values for the set of fieldscomprises: applying the set of conditions specified in the rule of theidentified policy to the data values for the set of fields; and upondetermining that the set of conditions are satisfied, performing the setof operations specified in the rule of the identified policy.
 9. Amethod, executable by a device comprising: providing a set of items in agraphical user interface (GUI) to a client device; receiving, from theclient device, a selection of an item in the set of items provided inthe GUI; determining a category associated with the item and a locationassociated with a user of the client device; identifying a form from aplurality of forms based on the category and the location, the formcomprising a set of fields, wherein each form in the plurality of formsstores a category and a location, wherein the identified form stores thelocation associated with the user and the category associated with theitem; providing, through the GUI, the form to the client device;receiving, through the GUI, data values for the set of fields from theclient device and a request to add the item to a collection of items;determining a type of policy; accessing a storage configured to store aplurality of policies, each policy in the plurality of policiescomprising a location, a category, a type, and a rule, the rule of eachpolicy in the set of policies comprising a set of conditions and a setof operations to perform when the set of conditions are met;identifying, from the plurality of policies stored in the storage, apolicy having a location that matches the location associated with theuser of the client device, a category that matches the categoryassociated with the item, and a type that matches the type of policy;applying the policy to the data values for the set of fields; based onthe application of the policy, determining whether to allow the item tobe added to the collection of items; and sending a notification to theclient device indicating whether the item is allowed to be added to thecollection of items.
 10. The method of claim 9, wherein the policy is afirst policy, the method further comprising: receiving a request for theitem and requisition information associated with the item; in responseto the request, identifying a second policy based on the category andthe location; and applying the second policy to the requisitioninformation.
 11. The method of claim 9, wherein determining whether toallow the item to be added to the collection of items comprises: upondetermining that the item cannot be added to the collection of items,preventing the item from being added to the collection of items; upondetermining that the item can be added to the collection of items,adding the item to the collection of items.
 12. The method of claim 9,wherein the location of the policy matches the location associated withthe user of the client device and the category of the policy matches thecategory associated with the item, wherein the set of conditions of therule of the identified policy comprises a condition that a data valueprovided for a field in the set of fields of the form is greater than adefined value, wherein the set of operations of the rule of theidentified policy comprises an operation to provide a notificationindicating that an item cannot be procured.
 13. The method of claim 9,wherein determining the location associated with user of the clientdevice comprises accessing a storage of the device configured to store aplurality of user profiles to identify the location associated with theuser.
 14. The method of claim 9, wherein determining the categoryassociated with the item comprises accessing a storage of the deviceconfigured to store a plurality of items to identify the categoryassociated with the item.
 15. The method of claim 9, wherein applyingthe policy to the data values for the set of fields comprises: applyingthe set of conditions specified in the rule of the identified policy tothe data values for the set of fields; and upon determining that the setof conditions are satisfied, performing the set of operations specifiedin the rule of the identified policy.
 16. A system comprising: a set ofprocessing units; and a non-transitory computer-readable medium storinginstructions that when executed by at least one processing unit in theset of processing units cause the at least one processing unit to:provide a set of items in a graphical user interface (GUI) to a clientdevice; receive, from the client device, a selection of an item in theset of items provided in the GUI; determine a category associated withthe item and a location associated with a user of the client device;identify a form from a plurality of forms based on the category and thelocation, the form comprising a set of fields, wherein each form in theplurality of forms stores a category and a location, wherein theidentified form stores the location associated with the user and thecategory associated with the item; provide through the GUI, the form tothe client device; receive, through the GUI, data values for the set offields from the client device and a request to add the item to acollection of items; determining a type of policy; access a storageconfigured to store a plurality of policies, each policy in theplurality of policies comprising a location, a category, a type, and arule, the rule of each policy in the set of policies comprising a set ofconditions and a set of operations to perform when the set of conditionsare met; identifying, from the plurality of policies stored in thestorage, a policy having a location that matches the location associatedwith the user of the client device, a category that matches the categoryassociated with the item, and a type that matches the type of policy;apply the policy to the data values for the set of fields; based on theapplication of the policy, determine whether to allow the item to beadded to the collection of items; and send a notification to the clientdevice indicating whether the item is allowed to be added to thecollection of items.
 17. The system of claim 16, wherein the policy is afirst policy, wherein the instructions further cause the at least oneprocessing unit to: receive a request for the item and requisitioninformation associated with the item; in response to the request,identify a second policy based on the category and the location; andapply the second policy to the requisition information.
 18. The systemof claim 16, wherein determining whether to allow the item to be addedto the collection of items comprises: upon determining that the itemcannot be added to the collection of items, preventing the item frombeing added to the collection of items; upon determining that the itemcan be added to the collection of items, adding the item to thecollection of items.
 19. The system of claim 16, wherein the location ofthe policy matches the location associated with the user of the clientdevice and the category of the policy matches the category associatedwith the item, wherein the set of conditions of the rule of theidentified policy comprises a condition that a data value provided for afield in the set of fields of the form is greater than a defined value,wherein the set of operations of the rule of the identified policycomprises an operation to provide a notification indicating that an itemcannot be procured.
 20. The system of claim 16, wherein determining thelocation associated with user of the client device comprises accessing afirst storage of the system configured to store a plurality of userprofiles to identify the location associated with the user, whereindetermining the category associated with the item comprises accessing asecond storage of the system configured to store a plurality of items toidentify the category associated with the item.
 21. The system of claim16, wherein applying the policy to the data values for the set of fieldscomprises: applying the set of conditions specified in the rule of theidentified policy to the data values for the set of fields; and upondetermining that the set of conditions are satisfied, performing the setof operations specified in the rule of the identified policy.