(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Keeping Track of Your Inventory

Tip of the Week: Keeping Track of Your Inventory

Regardless of your organization’s size, there is more than likely a large amount of information technology to keep track of and maintain. As is usually the case when so many moving parts and variables are involved, the task of keeping them organized can quickly become difficult and stressful. This week, we’ll give you a few tips on how a proper inventory can help your business stay apprised of its IT resources.

What Can an Inventory Do?
At its core, an inventory serves the purpose of keeping track of the assets and resources a business has in its possession. This spans from how many cases of burger patties a fast food franchise has to how much water a hydroponic plant has in reserve. Not only does this assist the business with ensuring that it always has the resources necessary to operate, it also assists with insurance claims. By keeping you up-to-date on what you have, an inventory serves as a documented resource that can support your claims if the need arises - such as after a disaster event or theft.

Furthermore, a detailed and up-to-date inventory record can help you to identify how old your resources are, allowing you to prioritize when it needs to be refreshed and/or replaced.

As one would imagine, these are all important factors to consider when technology is involved. In light of this, it becomes especially important to develop and enforce a unified and direct system as a standard during the inventorying process.

What Your Inventory Needs to Account For
As you create this system, you need to make sure it addresses the five key details included in a comprehensive inventory record.

1. What is it that you have?
Of course, the whole point of an inventory is to identify the resources you have on hand. Given the long, detailed names that many technology components have (in addition to the many details a piece of hardware or software will have that need to be addressed), it may make the most sense to develop a shorthand that easily and efficiently communicates what exactly it is that your business has in its possession.

For example, if you utilize differently-sized hard drives for different tasks and purposes, you will likely have a stash of these hard drives squirrelled away for later use. Rather than writing out a comprehensive list, creating an internal shorthand will make the task of inventorying these components much easier.

So, if a company were to have 7 spare hard drives, 1 blue hard disk drive with a 5 terabyte capacity, 3 red solid state drives with 10 terabytes each, 2 black hard disk drives with 10 terabytes each, and one purple hard disk drive with a capacity of 5 terabytes, using shorthand might simplify that list into:

  • 1 HDD - BLUE - 1TB
  • 3 SSD - RED - 10TB
  • 2 HDD - BLACK - 10TB
  • 1 HDD - PURPLE - 10TB

2. Where is it stored?
This consideration is especially important if a company has more than one location or stores their supplies in more than one spot in the building. Your inventory record needs to keep track of where a given component is kept so it may be found quickly if need be. Make sure you mark the building it is in, as well as the room and where specifically in that room it is kept. This adds a little more information to your shorthand list:

  • 1 HDD - BLUE - 1TB (MAIN LOCATION/BASEMENT/SHELF A)
  • 3 SSD - RED - 10TB (MAIN LOCATION/BASEMENT/SHELF E)
  • 2 HDD - BLACK - 10TB (SAT-OFFICE1/ROOM4/SHELF B)
  • 1 HDD - PURPLE - 10TB (SAT-OFFICE2/ROOM2/SHELF D)

3. Additional Details to Include
Finally, there are other pieces of information you should use your inventory process to track. To assist with potential insurance needs and monitoring your solutions for a refresh, it helps to add the date that the technology was acquired, as well as how much it cost to acquire it. As a result, your list becomes:

  • 1 HDD - BLUE - 1TB (MAIN LOCATION/BASEMENT/SHELF A) - $95 (May 9, 2017)
  • 3 SSD - RED - 1TB (MAIN LOCATION/BASEMENT/SHELF E) - $250 (June 30, 2017)
  • 2 HDD - BLACK - 1.5TB (SAT-OFFICE1/ROOM4/SHELF B) - $160 (August 18, 2017)
  • 1 HDD - PURPLE - 10TB (SAT-OFFICE2/ROOM2/SHELF D) - $355 (February 2, 2018)

Other Considerations for Your Inventory
Maintaining an up-to-date set of totals for your inventory is an essential process. After all, what’s the point of keeping track of your inventory if it isn’t going to be accurate anyway? This means that, in addition to ensuring that you start off with the right numbers, you need some sort of system to help you keep a running total. Whether this system is manually keeping totals on a clipboard, updating a spreadsheet, or leveraging asset management, is up to you.

Reach out to us here at NTConnections by calling (703) 288-9767 to see how we can help. In the meantime, keep checking back for more helpful tips and tricks.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, June 21 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Cloud Best Practices Privacy Hackers Business Computing Microsoft Hosted Solutions Productivity Internet Malware Backup Google Mobile Devices Efficiency VoIP Business IT Support IT Services Email Network Security Managed Service Provider Miscellaneous Server Innovation Data Workplace Tips Business Continuity Network Upgrade Disaster Recovery Software Windows Business Management Computer Managed IT Services Saving Money Hardware Communication Virtualization Smartphone Browser Save Money Android Mobile Device Management Smartphones communications User Tips Data Backup Outsourced IT Holiday Cybercrime Microsoft Office WiFi Computers Internet of Things BYOD Windows 10 Social Media Remote Monitoring Operating System Mobile Computing Cloud Computing Hacking Chrome Big Data Ransomware Small Business Data Recovery Automation Proactive IT Avoiding Downtime Collaboration VPN IT Solutions Managed IT Services Alert Application Apple Information Technology BDR Employer-Employee Relationship Passwords Office Marketing Budget The Internet of Things Quick Tips Tech Term Social Engineering Bandwidth Artificial Intelligence Managed IT Going Green Remote Computing Health Mobility Bring Your Own Device Recovery spam Gadgets Cybersecurity Telephone Systems Router Gmail Private Cloud Compliance How To Vulnerability Data Security Redundancy Wireless Technology User Error IT Support Office 365 Two-factor Authentication Data Protection Document Management Vendor Management Business Intelligence Website iPhone Money Save Time Firewall App Entertainment Tablet Analytics Lithium-ion battery Value Memory Retail Search Phishing Identity Theft Networking Mouse Apps Law Enforcement Data Management Productivity Risk Management Word PowerPoint Windows 10 Connectivity Excel Phone System Antivirus Office Tips Content Filtering Downtime Facebook History Smart Tech IT Plan Running Cable CES Physical Security DDoS Unified Threat Management Robot Data loss Skype Unsupported Software Mobile Office Environment Content Management Update Google Drive Public Cloud Customer Relationship Management Intranet Human Resources SaaS Training Best Available People Safety HIPAA Programming Government Cleaning Network Congestion Credit Cards Trending Meetings HaaS Education Fax Server IT Consultant Black Market Solid State Drive Applications Humor Infrastructure Saving Time Statistics Streaming Media Analysis Data Storage Internet Exlporer Online Currency Workers Data storage Encryption Biometrics Comparison Windows 7 Sports Business Owner Outlook Printer eWaste OneNote YouTube Flexibility USB Hard Drives Mobile Device Current Events IT Management Servers Work/Life Balance Administration Maintenance Best Practice Social Networking Net Neutrality Hiring/Firing Root Cause Analysis Workforce Thought Leadership Computer Repair Flash Chromecast WIndows 7 Fiber-Optic Electronic Health Records Analyitcs Software as a Service Patch Management Advertising Insurance Telecommuting Content Filter Machine Learning Sync Laptop Managing Stress Settings Cables Scam Distributed Denial of Service Virus Virtual Desktop Practices Touchscreen Remote Work Storage LinkedIn Charger Software Tips Unified Communications HVAC Telephony Touchpad IT service Virtual Reality Blockchain Debate Google Docs Relocation Hybrid Cloud Computer Care Uninterrupted Power Supply Computer Accessories Hosted Computing Addiction Theft Start Menu Domains PDF Bloatware Staff Spam Blocking Voice over Internet Protocol Audit IaaS HBO Cameras Customer Service Inventory Cache Video Surveillance Cortana Mobile Keyboard Consultant Entrepreneur Digital Signature Multi-Factor Security Screen Mirroring Frequently Asked Questions Tech Support Printer Server Access Control Fraud Wireless Internet Hacker Google Apps Professional Services Worker Commute Cost Management Strategy Piracy Computer Fan Lifestyle Cast Tip of the week Shadow IT Authentication Amazon Wire Science Tools User Wireless Files Password Instant Messaging Company Culture Licensing FENG Windows 8.1 Update Samsung Windows Server 2008 Wi-Fi Shortcut Nanotechnology Amazon Web Services Smart Office Twitter Windows 8 Password Manager SharePoint Colocation Accountants Electronic Medical Records Crowdfunding Bluetooth Online Shopping Paperless Office Tablets Business Mangement Botnet Monitor Hosted Solution Computing Infrastructure Notifications Legal Specifications Data Warehousing Regulations Devices Evernote Students Recycling Travel Print Server Reputation Wearable Technology End of Support Windows Media Player Social IoT Millennials NarrowBand Wireless Charging Healthcare Criminal Customers Internet exploMicrosoft Users Worker Supercomputer Content IT solutions Video Games Rootkit Knowledge Audiobook Netflix Scalability Politics Transportation How to webinar Benefits Loyalty Conferencing Windows 10s Smart Technology Battery Experience Two Factor Authentication Assessment Music Television Troubleshooting Techology Public Computer Employer Employee Relationship Data Breach Automobile Emails Books CrashOverride IBM Webinar Emergency