Male Rep 4


 "There is only one Boss. The Customer"

Have IT Questions?
Call us now (888) 894-6411


Tip of the Week: Keeping Track of Your Inventory

Tip of the Week: Keeping Track of Your Inventory

Regardless of your organization’s size, there is more than likely a large amount of information technology to keep track of and maintain. As is usually the case when so many moving parts and variables are involved, the task of keeping them organized can quickly become difficult and stressful. This week, we’ll give you a few tips on how a proper inventory can help your business stay apprised of its IT resources.

What Can an Inventory Do?
At its core, an inventory serves the purpose of keeping track of the assets and resources a business has in its possession. This spans from how many cases of burger patties a fast food franchise has to how much water a hydroponic plant has in reserve. Not only does this assist the business with ensuring that it always has the resources necessary to operate, it also assists with insurance claims. By keeping you up-to-date on what you have, an inventory serves as a documented resource that can support your claims if the need arises - such as after a disaster event or theft.

Furthermore, a detailed and up-to-date inventory record can help you to identify how old your resources are, allowing you to prioritize when it needs to be refreshed and/or replaced.

As one would imagine, these are all important factors to consider when technology is involved. In light of this, it becomes especially important to develop and enforce a unified and direct system as a standard during the inventorying process.

What Your Inventory Needs to Account For
As you create this system, you need to make sure it addresses the five key details included in a comprehensive inventory record.

1. What is it that you have?
Of course, the whole point of an inventory is to identify the resources you have on hand. Given the long, detailed names that many technology components have (in addition to the many details a piece of hardware or software will have that need to be addressed), it may make the most sense to develop a shorthand that easily and efficiently communicates what exactly it is that your business has in its possession.

For example, if you utilize differently-sized hard drives for different tasks and purposes, you will likely have a stash of these hard drives squirrelled away for later use. Rather than writing out a comprehensive list, creating an internal shorthand will make the task of inventorying these components much easier.

So, if a company were to have 7 spare hard drives, 1 blue hard disk drive with a 5 terabyte capacity, 3 red solid state drives with 10 terabytes each, 2 black hard disk drives with 10 terabytes each, and one purple hard disk drive with a capacity of 5 terabytes, using shorthand might simplify that list into:

  • 1 HDD - BLUE - 1TB
  • 3 SSD - RED - 10TB
  • 2 HDD - BLACK - 10TB
  • 1 HDD - PURPLE - 10TB

2. Where is it stored?
This consideration is especially important if a company has more than one location or stores their supplies in more than one spot in the building. Your inventory record needs to keep track of where a given component is kept so it may be found quickly if need be. Make sure you mark the building it is in, as well as the room and where specifically in that room it is kept. This adds a little more information to your shorthand list:


3. Additional Details to Include
Finally, there are other pieces of information you should use your inventory process to track. To assist with potential insurance needs and monitoring your solutions for a refresh, it helps to add the date that the technology was acquired, as well as how much it cost to acquire it. As a result, your list becomes:

  • 1 HDD - BLUE - 1TB (MAIN LOCATION/BASEMENT/SHELF A) - $95 (May 9, 2017)
  • 3 SSD - RED - 1TB (MAIN LOCATION/BASEMENT/SHELF E) - $250 (June 30, 2017)
  • 2 HDD - BLACK - 1.5TB (SAT-OFFICE1/ROOM4/SHELF B) - $160 (August 18, 2017)
  • 1 HDD - PURPLE - 10TB (SAT-OFFICE2/ROOM2/SHELF D) - $355 (February 2, 2018)

Other Considerations for Your Inventory
Maintaining an up-to-date set of totals for your inventory is an essential process. After all, what’s the point of keeping track of your inventory if it isn’t going to be accurate anyway? This means that, in addition to ensuring that you start off with the right numbers, you need some sort of system to help you keep a running total. Whether this system is manually keeping totals on a clipboard, updating a spreadsheet, or leveraging asset management, is up to you.

Reach out to us here at TWINTEL Solutions by calling (888) 894-6411 to see how we can help. In the meantime, keep checking back for more helpful tips and tricks.

Which Authentication Option is Best?
Four Questions to Have About Cloud Services

Related Posts



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, September 21 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!


Our 10 Benefits

Our 10 Benefits Whitepaper

This whitepaper will evaluate the differences between traditional technical support practices and modern managed IT practices and the pros and cons of both in regards to small and medium-sized businesses.

Download Now!   Need A Consultation?

Tag Cloud

Security Tip of the Week Best Practices Cloud Privacy Technology Business Computing Hackers Network Security Backup Malware Hosted Solutions Mobile Devices Microsoft VoIP Google bgc Disaster Recovery Software Email roundup Data nonprofit Managed IT Services Alert Outsourced IT Innovation Internet Business Business Continuity Smartphones communications Windows 10 Tech Term Hardware IT Services Ransomware Saving Money Data Backup Server Android Browser Cybercrime Managed IT Services Computers Cloud Computing Computer Small Business Efficiency Internet of Things IT Support Save Money Smartphone Business Management Quick Tips Productivity User Tips Network Data Recovery Windows BDR Passwords Office Miscellaneous Mobile Device Management Artificial Intelligence Applications Money Cybersecurity Telephone Systems Social Engineering IT Support BYOD Communication Managed IT Recovery Mobility Gadgets Upgrade Law Enforcement Work/Life Balance Hacking Facebook Productivity Vulnerability Virtualization Workplace Tips Collaboration Phishing Firewall Social Media Private Cloud App Windows 10 Two-factor Authentication Bandwidth Bring Your Own Device Wi-Fi Password Holiday Office 365 Router Automation Office Tips Data Protection Remote Monitoring Avoiding Downtime How To Managed Service Provider Compliance Health VPN Flexibility Chrome Budget Proactive IT Microsoft Office Remote Computing Data Breach Business Intelligence Google Drive Information Technology Word Sports History Black Market Mobile Computing Operating System Value Safety HaaS Redundancy Data Security Apps Identity Theft Mobile Device Connectivity Government Training Data Management Workers PDF USB Solid State Drive Encryption Managed Service Computing Infrastructure Keyboard Marketing Battery Content Filtering Content Management Credit Cards Computer Care Entertainment Patch Management Business Owner OneNote Emergency Blockchain Virtual Assistant Windows 7 Samsung Scam Big Data Spam Charger Settings Physical Security Unsupported Software Document Management Data Storage Website Electronic Medical Records Wireless Technology YouTube Legal Infrastructure Paperless Office Worker Save Time End of Support HIPAA IT Management Employer-Employee Relationship Data storage Risk Management Unified Threat Management Spam Blocking Comparison Automobile IT Plan Hiring/Firing Information Servers SaaS Update CES The Internet of Things Cleaning Business Mangement HVAC HBO Specifications Inventory Wiring Customers Tools Theft How to Laptop Relocation Trending Employer Employee Relationship Worker Commute webinar Chromecast Flash Evernote Wireless Internet Screen Mirroring WiFi Two Factor Authentication Safe Mode Files Windows Server 2008 Video Games Public Cloud Devices Troubleshooting Gmail Networking Outlook Millennials Vendor Management Access Control IBM Cortana Wire Touchpad Humor Data Warehousing Lifestyle Computer Accessories Conferencing Accountants MSP Hacker Sync Wireless Charging Scalability Assessment Experience Cast Google Docs Education IT Consultant NarrowBand Fraud Thought Leadership Supercomputer Recycling Enterprise Content Management Apple Workforce Authentication Mobile Google Apps Smart Office Techology Bluetooth Netflix File Sharing Internet Exlporer Telephony Fiber-Optic Television CrashOverride Going Green Leadership Human Resources Telephone System Regulations Amazon Audit Twitter Professional Services Transportation Shadow IT Current Events Books eWaste Password Management iPhone Frequently Asked Questions Telecommuting Nanotechnology Camera Software Tips Practices Augmented Reality Skype Cables Instant Messaging Public Computer Voice over Internet Protocol Users Staff Regulation User Error Amazon Web Services Loyalty Computer Fan Addiction Meetings Software as a Service Benefits Knowledge Hosted Solution Criminal NIST Downtime Excel Remote Work Best Practice Content Smart Tech Wireless Password Manager Machine Learning Rootkit Hosted Computing Remote Worker Reputation Advertising Start Menu Unified Communications Search Hard Drives Multi-Factor Security Virtual Reality Digital Signature Monitor Colocation Online Shopping Politics FENG Cache Data loss Smart Technology Network Congestion Cryptocurrency Robot Tip of the week Audiobook Windows 10s GDPR E-Commerce nonprofits Thank You Printers Congratulations