XFER Blog

XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Keeping Track of Your Inventory

Tip of the Week: Keeping Track of Your Inventory

Regardless of your organization’s size, there is more than likely a large amount of information technology to keep track of and maintain. As is usually the case when so many moving parts and variables are involved, the task of keeping them organized can quickly become difficult and stressful. This week, we’ll give you a few tips on how a proper inventory can help your business stay apprised of its IT resources.

What Can an Inventory Do?
At its core, an inventory serves the purpose of keeping track of the assets and resources a business has in its possession. This spans from how many cases of burger patties a fast food franchise has to how much water a hydroponic plant has in reserve. Not only does this assist the business with ensuring that it always has the resources necessary to operate, it also assists with insurance claims. By keeping you up-to-date on what you have, an inventory serves as a documented resource that can support your claims if the need arises - such as after a disaster event or theft.

Furthermore, a detailed and up-to-date inventory record can help you to identify how old your resources are, allowing you to prioritize when it needs to be refreshed and/or replaced.

As one would imagine, these are all important factors to consider when technology is involved. In light of this, it becomes especially important to develop and enforce a unified and direct system as a standard during the inventorying process.

What Your Inventory Needs to Account For
As you create this system, you need to make sure it addresses the five key details included in a comprehensive inventory record.

1. What is it that you have?
Of course, the whole point of an inventory is to identify the resources you have on hand. Given the long, detailed names that many technology components have (in addition to the many details a piece of hardware or software will have that need to be addressed), it may make the most sense to develop a shorthand that easily and efficiently communicates what exactly it is that your business has in its possession.

For example, if you utilize differently-sized hard drives for different tasks and purposes, you will likely have a stash of these hard drives squirrelled away for later use. Rather than writing out a comprehensive list, creating an internal shorthand will make the task of inventorying these components much easier.

So, if a company were to have 7 spare hard drives, 1 blue hard disk drive with a 5 terabyte capacity, 3 red solid state drives with 10 terabytes each, 2 black hard disk drives with 10 terabytes each, and one purple hard disk drive with a capacity of 5 terabytes, using shorthand might simplify that list into:

  • 1 HDD - BLUE - 1TB
  • 3 SSD - RED - 10TB
  • 2 HDD - BLACK - 10TB
  • 1 HDD - PURPLE - 10TB

2. Where is it stored?
This consideration is especially important if a company has more than one location or stores their supplies in more than one spot in the building. Your inventory record needs to keep track of where a given component is kept so it may be found quickly if need be. Make sure you mark the building it is in, as well as the room and where specifically in that room it is kept. This adds a little more information to your shorthand list:

  • 1 HDD - BLUE - 1TB (MAIN LOCATION/BASEMENT/SHELF A)
  • 3 SSD - RED - 10TB (MAIN LOCATION/BASEMENT/SHELF E)
  • 2 HDD - BLACK - 10TB (SAT-OFFICE1/ROOM4/SHELF B)
  • 1 HDD - PURPLE - 10TB (SAT-OFFICE2/ROOM2/SHELF D)

3. Additional Details to Include
Finally, there are other pieces of information you should use your inventory process to track. To assist with potential insurance needs and monitoring your solutions for a refresh, it helps to add the date that the technology was acquired, as well as how much it cost to acquire it. As a result, your list becomes:

  • 1 HDD - BLUE - 1TB (MAIN LOCATION/BASEMENT/SHELF A) - $95 (May 9, 2017)
  • 3 SSD - RED - 1TB (MAIN LOCATION/BASEMENT/SHELF E) - $250 (June 30, 2017)
  • 2 HDD - BLACK - 1.5TB (SAT-OFFICE1/ROOM4/SHELF B) - $160 (August 18, 2017)
  • 1 HDD - PURPLE - 10TB (SAT-OFFICE2/ROOM2/SHELF D) - $355 (February 2, 2018)

Other Considerations for Your Inventory
Maintaining an up-to-date set of totals for your inventory is an essential process. After all, what’s the point of keeping track of your inventory if it isn’t going to be accurate anyway? This means that, in addition to ensuring that you start off with the right numbers, you need some sort of system to help you keep a running total. Whether this system is manually keeping totals on a clipboard, updating a spreadsheet, or leveraging asset management, is up to you.

Reach out to us here at XFER by calling 734-927-6666 / 800-Get-XFER to see how we can help. In the meantime, keep checking back for more helpful tips and tricks.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, June 18 2018
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Saving Money Best Practices Backup Software Managed Service Provider Workplace Tips Business Computing Small Business Hackers Google Mobile Office Hosted Solutions Productivity Data Hardware Mobile Devices VoIP Quick Tips Gadgets Email Malware IT Support Efficiency Network Social Media Business Management Business Continuity IT Services Network Security Server Smartphones Virtualization Business Upgrade Miscellaneous Innovation Windows Disaster Recovery Communication Microsoft Office Users Managed IT Services Mobile Device Management Computer Communications User Tips Android Passwords Browser Smartphone Marketing Holiday WiFi Alert Save Money Data Backup Vendor Management Remote Monitoring Ransomware Mobile Computing Cybercrime Windows 10 Operating System Computers Bring Your Own Device Apple BYOD Information Technology Avoiding Downtime History Best Practice Internet of Things Chrome Cloud Computing Data Recovery Going Green Telephone Systems Big Data Outsourced IT Remote Computing IT Solutions Current Events VPN The Internet of Things Application Phone System Collaboration Hacking Wireless Technology Automation Social Engineering Spam IT Consultant Router BDR Firewall Employer-Employee Relationship Health Trending Artificial Intelligence Cybersecurity Excel Lithium-ion Battery Bandwidth App Money Tech Term Proactive IT Printer Facebook Office Budget Recovery Maintenance Windows 8 iPhone How To Content Filtering Business Intelligence Business Managament Two-factor Authentication Mobility Fax Server Managed IT Services Customer Relationship Management Data Security Hard Drives Value Mouse Website Managed IT User Error Networking Gmail Humor Phishing Apps Antivirus Outlook Private Cloud Tutorials Virus PowerPoint Unified Threat Management Analytics Data Protection Redundancy Law Enforcement Office 365 Conferencing Identity Theft Tech Support Tablet Save Time Sports Search Connectivity Inbound Marketing Twitter Google Drive Office Tips Document Management Streaming Media Risk Management Productivity Compliance Administration Mobile Device Flexibility Digital Payment Entertainment Social Networking Windows 10 Saving Time Computer Repair Retail Data Management Vulnerability Downtime Word Memory Network Congestion Windows 7 Bluetooth Work/Life Balance Computer Accessories Data Breach Wireless Physical Security People Cleaning Training Workers Samsung Public Cloud Robot SaaS Social USB Credit Cards Online Currency Scam Data storage Point of Sale Data loss IT Management Recycling Touchscreen eWaste Spam Blocking CES Statistics Internet Exlporer PDF IT Plan Skype HaaS End of Support Programming Safety Wi-Fi Government Content Management YouTube Video Surveillance Meetings Settings Infrastructure Running Cable Smart Tech Environment Unsupported Software Intranet OneNote Human Resources Wearable Technology Biometrics DDoS IBM Webinar Update Piracy Leadership IT service Solid State Drive Administrator Data Storage Best Available Encryption Hacker Comparison Black Market Worker Commute Online Shopping Distributed Denial of Service Files Scheduling Audit User Google Docs Staff Debate Chromecast Nanotechnology 3D Paperless Office Netflix Managing Stress Domains Botnet Business Mangement Password Practices eBay Bloatware Addiction Alerts Start Menu Theft Notifications Accountants Root Cause Analysis Science Data Warehousing Specifications Regulations Evernote Colocation Computer Fan Voice over Internet Protocol Digital Signature Laptop Supercomputer Entrepreneur HBO SharePoint Travel Criminal Shadow IT Hosted Computing Text Messaging Cache Work Station Mobile Cortana Hybrid Cloud Gaming Console Macro Tablets Millennials Knowledge Windows Media Player Virtual Desktop Servers Wireless Charging IaaS Computing Infrastructure Co-managed IT FENG Hiring/Firing Multi-Factor Security IT Security Strategy Education Touchpad Devices Cost Management Frequently Asked Questions Fraud Relocation Patch Management Print Server Legal Inventory Monitor Wireless Internet 360 Emails Professional Services nternet Google Apps Crowdfunding IoT Screen Mirroring Upgrades Analyitcs Remote Support Workforce Customer Service Flash Fiber-Optic Electronic Medical Records Lifestyle Thought Leadership Instant Messaging Tip of the week Amazon Company Culture Windows 10s Consultant Software as a Service Law Firm IT Access Control Business Owner Reputation Wire Tools Charger Cast Augmented Reality Telecommuting HIPAA IT Support Cameras Sync Cables LinkedIn Internet exploMicrosoft Webcam Hiring/Firing Content Filter Windows Server 2008 Amazon Web Services Net Neutrality Machine Learning Licensing Blockchain NarrowBand Authentication Windows 8.1 Update Customers Smart Office Hosted Solution WIndows 7 File Sharing Password Manager Uninterrupted Power Supply Insurance Computer Care Virtual Reality Software Tips Remote Work Storage Help Desk PC Care Keyboard Printer Server Shortcut Telephony Unified Communications Advertising Analysis Display Applications HVAC Smart Technology Scalability Thank You Books Loyalty Experience Two Factor Authentication How to Congratulations Content Students Emergency Techology Music Worker Audiobook Healthcare Assessment Rootkit Politics Electronic Health Records Transportation Television Troubleshooting Webinar Battery Benefits Video Games Automobile Public Computer IT solutions Employer Employee Relationship CrashOverride

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *