XFER Blog

XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Keeping Track of Your Inventory

Tip of the Week: Keeping Track of Your Inventory

Regardless of your organization’s size, there is more than likely a large amount of information technology to keep track of and maintain. As is usually the case when so many moving parts and variables are involved, the task of keeping them organized can quickly become difficult and stressful. This week, we’ll give you a few tips on how a proper inventory can help your business stay apprised of its IT resources.

What Can an Inventory Do?
At its core, an inventory serves the purpose of keeping track of the assets and resources a business has in its possession. This spans from how many cases of burger patties a fast food franchise has to how much water a hydroponic plant has in reserve. Not only does this assist the business with ensuring that it always has the resources necessary to operate, it also assists with insurance claims. By keeping you up-to-date on what you have, an inventory serves as a documented resource that can support your claims if the need arises - such as after a disaster event or theft.

Furthermore, a detailed and up-to-date inventory record can help you to identify how old your resources are, allowing you to prioritize when it needs to be refreshed and/or replaced.

As one would imagine, these are all important factors to consider when technology is involved. In light of this, it becomes especially important to develop and enforce a unified and direct system as a standard during the inventorying process.

What Your Inventory Needs to Account For
As you create this system, you need to make sure it addresses the five key details included in a comprehensive inventory record.

1. What is it that you have?
Of course, the whole point of an inventory is to identify the resources you have on hand. Given the long, detailed names that many technology components have (in addition to the many details a piece of hardware or software will have that need to be addressed), it may make the most sense to develop a shorthand that easily and efficiently communicates what exactly it is that your business has in its possession.

For example, if you utilize differently-sized hard drives for different tasks and purposes, you will likely have a stash of these hard drives squirrelled away for later use. Rather than writing out a comprehensive list, creating an internal shorthand will make the task of inventorying these components much easier.

So, if a company were to have 7 spare hard drives, 1 blue hard disk drive with a 5 terabyte capacity, 3 red solid state drives with 10 terabytes each, 2 black hard disk drives with 10 terabytes each, and one purple hard disk drive with a capacity of 5 terabytes, using shorthand might simplify that list into:

  • 1 HDD - BLUE - 1TB
  • 3 SSD - RED - 10TB
  • 2 HDD - BLACK - 10TB
  • 1 HDD - PURPLE - 10TB

2. Where is it stored?
This consideration is especially important if a company has more than one location or stores their supplies in more than one spot in the building. Your inventory record needs to keep track of where a given component is kept so it may be found quickly if need be. Make sure you mark the building it is in, as well as the room and where specifically in that room it is kept. This adds a little more information to your shorthand list:

  • 1 HDD - BLUE - 1TB (MAIN LOCATION/BASEMENT/SHELF A)
  • 3 SSD - RED - 10TB (MAIN LOCATION/BASEMENT/SHELF E)
  • 2 HDD - BLACK - 10TB (SAT-OFFICE1/ROOM4/SHELF B)
  • 1 HDD - PURPLE - 10TB (SAT-OFFICE2/ROOM2/SHELF D)

3. Additional Details to Include
Finally, there are other pieces of information you should use your inventory process to track. To assist with potential insurance needs and monitoring your solutions for a refresh, it helps to add the date that the technology was acquired, as well as how much it cost to acquire it. As a result, your list becomes:

  • 1 HDD - BLUE - 1TB (MAIN LOCATION/BASEMENT/SHELF A) - $95 (May 9, 2017)
  • 3 SSD - RED - 1TB (MAIN LOCATION/BASEMENT/SHELF E) - $250 (June 30, 2017)
  • 2 HDD - BLACK - 1.5TB (SAT-OFFICE1/ROOM4/SHELF B) - $160 (August 18, 2017)
  • 1 HDD - PURPLE - 10TB (SAT-OFFICE2/ROOM2/SHELF D) - $355 (February 2, 2018)

Other Considerations for Your Inventory
Maintaining an up-to-date set of totals for your inventory is an essential process. After all, what’s the point of keeping track of your inventory if it isn’t going to be accurate anyway? This means that, in addition to ensuring that you start off with the right numbers, you need some sort of system to help you keep a running total. Whether this system is manually keeping totals on a clipboard, updating a spreadsheet, or leveraging asset management, is up to you.

Reach out to us here at XFER by calling 734-927-6666 / 800-Get-XFER to see how we can help. In the meantime, keep checking back for more helpful tips and tricks.

Which Authentication Option is Best?
Big Data is Making Its Way to Small Business
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, January 17 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Best Practices Saving Money Backup Software Workplace Tips Business Computing Managed Service Provider Hosted Solutions Data Hackers Small Business Google Hardware Mobile Devices Productivity VoIP Mobile Office Malware Email Gadgets Quick Tips Network Security Network Efficiency Innovation IT Support Business Management IT Services Business Social Media Business Continuity Miscellaneous Smartphones Server Upgrade Virtualization Communication Windows Disaster Recovery User Tips Data Backup Communications Computer Microsoft Office Managed IT Services Users Smartphone Passwords Browser Data Recovery Mobile Device Management Android Holiday WiFi Save Money Marketing Alert Ransomware Tech Term Outsourced IT Cybercrime BDR Mobile Computing Vendor Management Internet of Things Chrome Remote Monitoring Router Cloud Computing Windows 10 Operating System Computers Avoiding Downtime Automation Bring Your Own Device Apple Artificial Intelligence BYOD Information Technology VPN Big Data Remote Computing Current Events IT Solutions Managed IT Services History Best Practice The Internet of Things Telephone Systems Cybersecurity Going Green Firewall Spam Collaboration Hacking Health Phone System Social Engineering Wireless Technology Trending Employer-Employee Relationship IT Consultant Printer Facebook Application Bandwidth Lithium-ion Battery Excel Office App Mobility Budget Productivity Money Windows 10 Proactive IT Business Managament Business Intelligence IT Support Fax Server iPhone Maintenance Mouse Windows 8 Networking Content Filtering Mobile Device How To Office 365 Two-factor Authentication Applications Unified Threat Management Phishing Recovery Data Protection Tutorials Google Drive Antivirus Virus Blockchain Word Customer Relationship Management Managed IT Analytics Training Website Hard Drives Data Security Gmail Private Cloud Redundancy Access Control Law Enforcement Settings Sports Apps Value User Error Encryption Information PowerPoint Humor Outlook Administrator Managed Service Save Time Connectivity Saving Time Vulnerability Office Tips Inbound Marketing Identity Theft Downtime Social File Sharing Wi-Fi Memory Compliance Tech Support Flexibility Voice over Internet Protocol Entertainment Conferencing Scam IT Management Administration Data Management Retail Servers Human Resources Digital Payment Search Social Networking Tablet Computer Repair Twitter Machine Learning Document Management Analysis Network Congestion Hacker Software as a Service Streaming Media Risk Management Leadership SaaS Paperless Office Skype Programming Update OneNote USB Webinar Computer Accessories Data storage Robot Comparison Running Cable Telephony Augmented Reality Intranet Virtual Assistant Data Storage Windows 7 eWaste Wearable Technology Help Desk Google Docs Internet Exlporer Keyboard Botnet PDF Safety Work/Life Balance Data Breach HaaS End of Support YouTube Best Available Telephone System Government Display Credit Cards Touchscreen Meetings Bluetooth Workers People Instant Messaging Samsung Smart Tech Environment DDoS Data loss Fraud CES Solid State Drive IT Plan Video Surveillance Black Market Biometrics Online Currency Point of Sale Recycling Spam Blocking IT service Wireless Physical Security Education Content Management Cleaning Password Unsupported Software Piracy Statistics IBM Infrastructure Public Cloud Laptop nternet Crowdfunding Practices Business Owner Bloatware Sync Cables Remote Support Colocation Search Engine Windows 10s Managing Stress Domains Accountants Business Technology Charger Cast Science Windows Server 2008 PC Care Amazon Web Services SharePoint Addiction Virtual Private Network Shadow IT Hiring/Firing Software Tips 3D Remote Work Law Firm IT Wiring HIPAA Scheduling Password Manager Hybrid Cloud Company Culture Enterprise Content Management eBay Touchpad Hosted Computing Proactive Entrepreneur Unified Communications IaaS Computing Infrastructure Students Bing Legal LinkedIn Computer Care Tablets Online Shopping Alerts Relocation Cache Project Management Hosted Solution Staff Hiring/Firing Monitor Devices GDPR Windows Media Player Virtual Desktop Business Mangement Net Neutrality Password Management Data Warehousing Specifications Text Messaging Inventory Remote Monitoring and Maintenance Cost Management Start Menu Theft Windows 8.1 Update Healthcare Shortcuts Audit IoT Upgrades Analyitcs Regulations Evernote Work Station Wireless Internet Warranty Netflix Gaming Console Digital Signature NIST Root Cause Analysis HBO Reputation Debate Thought Leadership E-Commerce Customer Service Travel Criminal Consultant Millennials Line of Business Supercomputer Mobile Cortana Internet exploMicrosoft Electronic Health Records eCommerce Computer Fan Strategy NarrowBand Macro Wireless Charging Wire Microchip Multi-Factor Security Cryptocurrency Co-managed IT Frequently Asked Questions Customers Content Filter Camera Cameras Uninterrupted Power Supply Licensing Workforce Authentication MSP Knowledge Professional Services Google Apps Advertising Vendor FENG Lifestyle Chromecast Insurance Virtual Reality Flash Fiber-Optic Distributed Denial of Service Files Smart Office Patch Management WIndows 7 Safe Mode Screen Mirroring Tip of the week Amazon IT Security Storage 360 Emails Printer Server Shortcut Webcam User Telecommuting Print Server Nanotechnology Remote Worker Worker Commute Tools Notifications HVAC Security Cameras Electronic Medical Records How to Television Transportation Troubleshooting Webinar Techology Employee/Employer Relationship Automobile Public Computer Benefits IT solutions Employer Employee Relationship CrashOverride Thank You Smartwatch Smart Technology Loyalty Books Experience Congratulations Battery Content Two Factor Authentication Video Games Regulation Emergency Worker Music Audiobook Scalability Assessment Utility Computing Rootkit Printers Politics

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *