XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Keeping Track of Your Inventory

Tip of the Week: Keeping Track of Your Inventory

Regardless of your organization’s size, there is more than likely a large amount of information technology to keep track of and maintain. As is usually the case when so many moving parts and variables are involved, the task of keeping them organized can quickly become difficult and stressful. This week, we’ll give you a few tips on how a proper inventory can help your business stay apprised of its IT resources.

What Can an Inventory Do?
At its core, an inventory serves the purpose of keeping track of the assets and resources a business has in its possession. This spans from how many cases of burger patties a fast food franchise has to how much water a hydroponic plant has in reserve. Not only does this assist the business with ensuring that it always has the resources necessary to operate, it also assists with insurance claims. By keeping you up-to-date on what you have, an inventory serves as a documented resource that can support your claims if the need arises - such as after a disaster event or theft.

Furthermore, a detailed and up-to-date inventory record can help you to identify how old your resources are, allowing you to prioritize when it needs to be refreshed and/or replaced.

As one would imagine, these are all important factors to consider when technology is involved. In light of this, it becomes especially important to develop and enforce a unified and direct system as a standard during the inventorying process.

What Your Inventory Needs to Account For
As you create this system, you need to make sure it addresses the five key details included in a comprehensive inventory record.

1. What is it that you have?
Of course, the whole point of an inventory is to identify the resources you have on hand. Given the long, detailed names that many technology components have (in addition to the many details a piece of hardware or software will have that need to be addressed), it may make the most sense to develop a shorthand that easily and efficiently communicates what exactly it is that your business has in its possession.

For example, if you utilize differently-sized hard drives for different tasks and purposes, you will likely have a stash of these hard drives squirrelled away for later use. Rather than writing out a comprehensive list, creating an internal shorthand will make the task of inventorying these components much easier.

So, if a company were to have 7 spare hard drives, 1 blue hard disk drive with a 5 terabyte capacity, 3 red solid state drives with 10 terabytes each, 2 black hard disk drives with 10 terabytes each, and one purple hard disk drive with a capacity of 5 terabytes, using shorthand might simplify that list into:

  • 1 HDD - BLUE - 1TB
  • 3 SSD - RED - 10TB
  • 2 HDD - BLACK - 10TB
  • 1 HDD - PURPLE - 10TB

2. Where is it stored?
This consideration is especially important if a company has more than one location or stores their supplies in more than one spot in the building. Your inventory record needs to keep track of where a given component is kept so it may be found quickly if need be. Make sure you mark the building it is in, as well as the room and where specifically in that room it is kept. This adds a little more information to your shorthand list:


3. Additional Details to Include
Finally, there are other pieces of information you should use your inventory process to track. To assist with potential insurance needs and monitoring your solutions for a refresh, it helps to add the date that the technology was acquired, as well as how much it cost to acquire it. As a result, your list becomes:

  • 1 HDD - BLUE - 1TB (MAIN LOCATION/BASEMENT/SHELF A) - $95 (May 9, 2017)
  • 3 SSD - RED - 1TB (MAIN LOCATION/BASEMENT/SHELF E) - $250 (June 30, 2017)
  • 2 HDD - BLACK - 1.5TB (SAT-OFFICE1/ROOM4/SHELF B) - $160 (August 18, 2017)
  • 1 HDD - PURPLE - 10TB (SAT-OFFICE2/ROOM2/SHELF D) - $355 (February 2, 2018)

Other Considerations for Your Inventory
Maintaining an up-to-date set of totals for your inventory is an essential process. After all, what’s the point of keeping track of your inventory if it isn’t going to be accurate anyway? This means that, in addition to ensuring that you start off with the right numbers, you need some sort of system to help you keep a running total. Whether this system is manually keeping totals on a clipboard, updating a spreadsheet, or leveraging asset management, is up to you.

Reach out to us here at XFER by calling 734-927-6666 / 800-Get-XFER to see how we can help. In the meantime, keep checking back for more helpful tips and tricks.

Which Authentication Option is Best?
Big Data is Making Its Way to Small Business


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, October 19 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Saving Money Best Practices Backup Software Workplace Tips Managed Service Provider Business Computing Hackers Small Business Data Hosted Solutions Hardware Google Mobile Devices Productivity Mobile Office VoIP Gadgets Email Malware Quick Tips Network Security Network Efficiency IT Support Social Media Innovation Business Management IT Services Server Miscellaneous Business Continuity Smartphones Upgrade Business Virtualization Windows Communication Disaster Recovery Computer Managed IT Services Communications Microsoft Office User Tips Users Data Backup Passwords Mobile Device Management Browser Android Marketing Save Money Smartphone Alert Data Recovery Ransomware Holiday WiFi Outsourced IT Vendor Management Tech Term Mobile Computing Windows 10 Remote Monitoring Internet of Things Cybercrime Operating System Avoiding Downtime Cloud Computing Bring Your Own Device Computers Apple BYOD Information Technology BDR VPN Telephone Systems Firewall Big Data Remote Computing Chrome IT Solutions Router Current Events Going Green The Internet of Things Automation Artificial Intelligence History Best Practice Cybersecurity Printer Spam Facebook Phone System Wireless Technology Application Collaboration IT Consultant Health Trending Hacking Social Engineering Employer-Employee Relationship Office Money App Proactive IT Budget Lithium-ion Battery Bandwidth Excel Managed IT Services iPhone Two-factor Authentication How To Mobility Mouse Business Intelligence Applications Recovery Business Managament Content Filtering Windows 10 Fax Server Maintenance Windows 8 Unified Threat Management Networking Data Security Private Cloud User Error Redundancy Customer Relationship Management Training Hard Drives Law Enforcement Office 365 Humor Antivirus Productivity Outlook Tutorials Analytics Virus Phishing Apps Data Protection Website Managed IT PowerPoint Value Gmail Sports Document Management Identity Theft Retail Streaming Media Risk Management Settings Data Management Inbound Marketing IT Management Network Congestion Encryption Saving Time Information Analysis Downtime Administration Mobile Device File Sharing Memory Save Time Digital Payment Social Networking Google Drive Connectivity Conferencing Computer Repair Office Tips IT Support Vulnerability Blockchain Word Compliance Tech Support Tablet Flexibility Search Scam Twitter Entertainment Recycling Instant Messaging YouTube Point of Sale Government Computer Accessories Environment Meetings Workers Access Control Education Human Resources Smart Tech Statistics Biometrics Credit Cards DDoS Solid State Drive Data loss Machine Learning Skype Social IT service Programming Hacker Black Market Servers Spam Blocking Augmented Reality Intranet CES Running Cable Fraud Touchscreen Cleaning Password IT Plan Wireless Physical Security Wearable Technology Public Cloud Webinar Paperless Office Managed Service Content Management Robot USB SaaS Infrastructure Best Available Unsupported Software OneNote Data storage Bluetooth Video Surveillance Update Virtual Assistant People Internet Exlporer Data Storage Samsung eWaste PDF IBM Comparison Keyboard Piracy End of Support Online Currency Leadership Safety Wi-Fi Work/Life Balance Data Breach Telephone System Administrator Windows 7 HaaS Netflix Thought Leadership E-Commerce PC Care Botnet Business Mangement Macro NIST Consultant Start Menu Theft Co-managed IT Root Cause Analysis Electronic Health Records Scheduling Data Warehousing Specifications Reputation Line of Business IT Security 3D Internet exploMicrosoft Computer Fan Wire Voice over Internet Protocol Digital Signature Cameras Supercomputer Print Server eBay Regulations Evernote Content Filter Camera Remote Support Alerts Travel Criminal NarrowBand Cryptocurrency nternet Crowdfunding HBO Licensing Mobile Cortana Virtual Reality Uninterrupted Power Supply Millennials WIndows 7 Customers Authentication MSP Advertising FENG Smart Office Company Culture Multi-Factor Security Strategy Printer Server Shortcut Knowledge Insurance Law Firm IT Text Messaging Wireless Charging Patch Management Storage Work Station Worker Commute Chromecast Safe Mode Gaming Console Frequently Asked Questions User Distributed Denial of Service Files Professional Services Google Apps Bloatware Screen Mirroring HVAC LinkedIn Workforce Managing Stress Domains 360 Emails Nanotechnology Remote Worker Science Notifications Electronic Medical Records Net Neutrality Lifestyle Practices Flash Fiber-Optic Windows 10s Addiction Virtual Private Network Windows 8.1 Update Software as a Service Laptop Business Owner Accountants Business Technology Tip of the week Amazon Colocation Display Tools Entrepreneur Shadow IT Charger Cast Enterprise Content Management Telecommuting SharePoint Help Desk Wiring Cables Tablets Hybrid Cloud Hiring/Firing Students HIPAA Hosted Computing Proactive Debate Sync Cache Project Management Windows Media Player Virtual Desktop Touchpad Windows Server 2008 Amazon Web Services Hiring/Firing IaaS Computing Infrastructure GDPR Password Manager Cost Management Legal Computer Care Password Management Webcam Software Tips Remote Work Relocation Hosted Solution Devices Telephony Unified Communications Upgrades Analyitcs Healthcare Monitor Inventory Remote Monitoring and Maintenance Audit Wireless Internet Warranty Google Docs Staff Customer Service IoT Online Shopping Loyalty Books Experience Two Factor Authentication Battery Content Regulation Emergency Video Games Worker Music Audiobook Printers Scalability Assessment Rootkit Politics Transportation How to Television Techology Troubleshooting Webinar Thank You Benefits Automobile Public Computer IT solutions Employer Employee Relationship CrashOverride Congratulations Smart Technology

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *
      • Company Name *
      • Number of Participants *
      • First Name *
      • Last Name *
      • Phone *
      • Yes, subscribe me to: