Running head: INVENTORY MANAGEMENT SYSTEMS
Inventory Management Systems
Tim DeYoung
Rasoul Ahari
CIS 210
12-Jul-18
1
INVENTORY MANAGEMENT SYSTEMS
2
Introduction
Manual inventory tracking can be difficult especially in a clothing store which needs to
make a profit. For the success of the business, it is important to ensure that stock is controlled in
a very effective and efficient way. Keeping inventory in check enables the business owner to
know and understand which stock if fast moving. Being able to differentiate which is fast
moving and slow moving is important in decision making on what or not to stock. Manual
ordering and inventory management can result in costly mistakes in a small business (Zipkin,
2000). Without a proper inventory management system, it is very difficult to determine what to
order, when, and why it is important to stock that item. Installing an inventory management
system will of significant use can increase the success rate as well as the profitability of the
business. It also helps in time-saving in the tracking of inventory hence giving the owner of the
business more time to concentrate on expanding the business. Other than reducing management
cost and stress related to stocking, inventory management will serve the following roles;
Customer service
Customers hate to be disappointed and, in many cases, this is as a result of not meeting
their expectations. Customer disappointments resulting from faux pas like allowing them to order
products that are out of stock can cost the business severely. To avoid this, effective inventory
management helps to easily cross-check the available stock before committing to the customer
(Parpia, I. H., & Singh, 2016). It also helps to track demand of each provide. My sister will be
able to determine which clothes are more favorable for stock in her business and which ones are
more profitable to her.
INVENTORY MANAGEMENT SYSTEMS
3
Theft control and financial management
This is a non-issue in a small business where there is only one handler. It is, however,
necessary since theft can also be by customers. Effective inventory control helps to confirm
stock easily from time to time without wasting much time. It will also improve bookkeeping as
the number of each and every stocked item will be tracked. This will help to improve the
financial position of the business since any loss of items will be controlled.
Describe all the necessary equipment
In order to be able to categorically decide the necessary equipment needed, it is important
to first understand the problem that needs to solve. A new system has to solve a specified
challenge which in this case is tracking of inventory. Since the problem is taking manual track
and recording of inventory, the system should ensure that it is effective and efficient in its role of
inventory management. Fortunately, technology has made it not only possible but also easy for
both small and established businesses to manage their inventory. There is a cost-effective
inventory control system that can be applicable irrespective of the budget stated. Barcode has
been used for decades not and still proves to be effective in inventory management. This system
has advanced and can be implemented easily and fully manage inventory with very minimal
upfront investment (Müller, & Amacom, 2011).
A basic and cost-effective barcode inventory system requires the following equipment;
scanners, barcode markers or printers as well as accessories, inventory control software, label
printers, backup devices and but not limited to computer software. This system is known to
eliminate human error in inventory management. The role of the laptop is to utilize the software,
INVENTORY MANAGEMENT SYSTEMS
4
establishment of the barcode reference form, and data implementation. An external hardware will
help in backing up the business’s information that can be used to restore the system in the event
of a system breakdown.
The costs involved in the creation of the system
Since my sister has a controlled or small budget for the establishment and management of
the inventory control, this cost analysis will only focus on the basics that are necessary. Much of
the budget will be channeled towards purchases of the equipment. This includes the purchase of;
laptop, barcode scanner and related accessories, label printer, and an external backup device.
These are the basic purchases that will cover up to 60% of the total budget. For the effectiveness
of the system to be realized, there must be a software that will necessitate the process. This will
require a software developer who will be tasked with the responsibility of designing reliable
software for the system. This is the second highest expenditure that will take up to 20% of the
total budget. The remaining 10 percent will be incurred in training my sister on how to use the
system and initial data entry for all the available stock (Relph, 2016).
The ongoing maintenance that will be required
For effective inventory management, there must be a control center where product
labeling will be done. Each cloth that comes in must be recorded with the rest of the stock before
it is released to the rest of the stock for sale. This requires a control center to be established on
just a side desk. Such a system does not require intensive ongoing maintenance, but it is
important to update the system from time to time. Systems required regular updates whether it is
used daily or not. The label printer will have to be checked regularly and feed with the required
INVENTORY MANAGEMENT SYSTEMS
5
printing ink and papers. The printer will also have to be serviced and if need be replaced for
effective delivery of its services. This will equally apply to the barcode marker which needs to be
maintained or replaced (Parpia, I. H., & Singh, 2016). The software developer should have a
regular check of the entire system not just when issue(s) arises but just to ensure that it is
working as it should be. If the system fails to work or to meet my sister’s expectations as time
goes by, she will have to adopt another inventory maintenance that suits her business better. This
will, however, require a bigger budget.
Workflow diagram
INVENTORY MANAGEMENT SYSTEMS
6
Conclusion
In conclusion, it is important for my sister to ensure that she has an effective and efficient
inventory management solution to avoid making unnecessary loses. In this scenario, the use of a
barcode is the most appropriate and within her small budget. The use of barcodes is a reliable
way of managing inventory and has no limitations attached to it. The system will help her
improve her customer service and control her stock appropriately. It will also save her a lot of
time that will enable her to concentrate more on expanding her small business. The system will
have to be maintained from time to time so as to ensure that it serves its purpose as intended
(Zipkin, 2000). Maintenance will include replacement of label printers and the barcode makers.
If well used, this will help my sister to solve the issue of inventory control.
INVENTORY MANAGEMENT SYSTEMS
7
References
Müller, M., & Amacom. (2011). Essentials of inventory management. New York, NY: American
Management Association.
Parpia, I. H., & Singh, G. (2016). U.S. Patent No. 9,280,757. Washington, DC: U.S. Patent and
Trademark Office.
Relph, G. (2016). Inventory management: Advanced methods for managing inventory within
business systems. Place of publication not identified: Kogan Page Stylus.
Zipkin, P. H. (2000). Foundations of inventory management. Boston: McGraw-Hill.
Running head: BUILDING AN ACCESS CONTROL SYSTEM
Building an Access Control System
Timothy DeYoung
Rasoul Ahari
CIS 210
26 July 2018
1
BUILDING AN ACCESS CONTROL SYSTEM
2
Abstract
As a project manager, a small university has ordered the building is an access control system
to their dormitories to control the access of the building and in the process only allow authorized
personnel inside the building. The access control system will automatically lock the dormitories
using an electrical reader, and on the same account, cameras will be available to record persons
accessing the vicinity. The team will develop a scope for the project giving detail to all the
necessary aspects to complete the project. Moreover, the scope will indicate other elements such
as charts showing the task to be carried out in the project (Numao, M., Kudoh, M., & Amano, T,
2003).
Project Scope Statement
The small university has given full rights to my information security team to install an
access control system in the dormitories of the college. The system is highly depended on to
boost the aspects of security within the dormitory regions where there have been numerous
complaints by students about the rise in theft cases. To achieve this state of security the access
control system will moderate the number of unauthorized individuals who access the dormitories
and in addition to that control, the number of authorized individuals since the scope of the
project is to ensure the installation of an access control system. To make the project successful
upon completion, it has to include installation, operation, maintenance, repair and the support of
the system. The system will automatically lock and unlock the doors via an electric reader with
the aid of a camera that will be used to identify and allow access or deny access to individuals
attempting to make an entrance to the dormitories (Outwater, C., & Redmann, W. G, 2018).
BUILDING AN ACCESS CONTROL SYSTEM
3
The college regards the control system as a solution to the problem as it consists of software
and hardware that are designed to allow entry or access into a specific area which in this case is
the dormitory. The system is therefore designed with the sole purpose of controlling access
hence increasing the security in the selected area. A unique feature in this particular installation
is that the system will have a storage space that will allow safekeeping of log events meaning in
case any footage will be needed from a given past date it can be retrieved.
To enhance the security at the institution, the system will require the assistance of the best
technology available with the goal being the installation of an access control system that will
identify the student using the individual identification, for instance, the school ID or respective
dormitory ID. The identification will best be improvised using a card which may be swiped to
gain access to the dormitory. The cameras will be used to confirm the identity of the student. For
instance, an unauthorized student using the card of an authorized student will not be allowed due
to the use of the cameras limiting the instance where a card may be stolen and used to access the
area.
The financial part of the project needs to be sufficient enough to cover all the activities
required in the project. These activities will be in the form of tasks which will make the project
take an approximate of one month to complete and get implemented. The project will have to be
carried out within the school to allow a more comfortable and efficient testing of the system.
Students will not be available because it will be during the holiday season. After the installation,
the team will ensure that they provide support and maintenance of the system to ensure correct
working or functioning of the access control system (Webb, M. A., Corwin, L. G., & Petersen,
M. L, 2018).
BUILDING AN ACCESS CONTROL SYSTEM
4
Tasks involved in the project
Preparation; this is the first task in the installation of the system, and it entails constituting
a team to perform the initial part of the project which is the survey of the whole school and the
specified area which in this case is the dormitory. The second aspect is the design of the system
which will include a diagram of how the system will operate in and out of the dormitory.
Feasibility; as the second task this stage will involve a pilot study of the situation hence the
first subtask will be the investigation of the existing system and creation of a proposal to the
management on the estimates for the materials needed for the project.
Installation; this is regarded as the core task of the project as it will involve the actual
implementation of the design in the feasibility part. The first subtask is the installation of the
control panel and the wires which make up the communications line and the second subtask will
be the installation of readers at the entrance doors in the dormitories.
Configuration; this is another task that will involve the arrangement of the different
installed parts to mark the completion of installation. The first subtask will be the configuration
of the system to carry out system administration activities and secondly the creation of
commands in the form of codes that will either permit or deny an individual accessing the
dormitory.
Execution; this is the final task in which the end of the project will be marked by first
testing the installed system and secondly announcement of the deployment which will only be
done once the test is completed.
BUILDING AN ACCESS CONTROL SYSTEM
5
Gantt Chart of the tasks
Gantt Chart
29-Mar
3-Apr
8-Apr
13-Apr
18-Apr
23-Apr
28-Apr
Preparation
Feasibility
Instalation
Configuration
Execution
Staring date
Days to complete
Execution
26-Apr
Configuration
19-Apr
Instalation
7-Apr
Feasibility
2-Apr
Preparation
29-Mar
2
8
12
5
4
Figure 1.0 Gantt Chart showing the tasks in the project
System Diagram
Figure 1.1 figure showing the requirement of the project
BUILDING AN ACCESS CONTROL SYSTEM
6
References
Numao, M., Kudoh, M., & Amano, T. (2003). U.S. Patent No. 6,647,388. Washington, DC: U.S.
Patent and Trademark Office.
Outwater, C., & Redmann, W. G. (2018). U.S. Patent No. 9,911,258. Washington, DC: U.S.
Patent and Trademark Office.
Webb, M. A., Corwin, L. G., & Petersen, M. L. (2018). U.S. Patent No. 9,957,733. Washington,
DC: U.S. Patent and Trademark Office.
Purchase answer to see full
attachment