EN Inventory Emanuele Piemonti Spalazzi EN-GMS-Adm 15.04.2014.

Slides:



Advertisements
Similar presentations
Alex Smoler Features Update for ASSET-id. Pain in the Rear to Track Paper Log Is Basically Worthless Lots of Paperwork Generated When Loaning to Third.
Advertisements

Using the Palm Pilot for Data Collection. Overview: These procedures will assist when using the Palm Pilot for: Physical Inventory Counts Bar Code Collection.
1 Survey Technology. Data Collection Tools Available in the Market 1. Paper Survey 2. Smart Paper 3. Cell Phones 4. Personal Digital Assistants - PDAs.
TRAINING FOR PSION WORKABOUT PRO HANDSETS
Overview of IS Controls, Auditing, and Security Fall 2005.
®® Microsoft Windows 7 Windows Tutorial 8 Connecting to Networks with Mobile Computing.
Property Custodian Meeting June 18, Final Tally for FY 14  We are currently missing approximately 3.5% of the inventory (5.7% last year). The total.
Auditing Computer Systems
Twinning Project RO2006/IB/EN/09 1 Saxony-Anhalt State Environmental Protection Agency Wolfgang GarcheBukarest Wolfgang Garche Saxony-Anhalt.
PMI Inventory Tracker™
Bar|Scan ® Asset Inventory System The leader in asset and inventory management.
Computer Architecture Ports.  There are lots of external devices that you can connect to your computer. All external devices connect to the computer’s.
Installing software on personal computer
Software Development Unit 2 Databases What is a database? A collection of data organised in a manner that allows access, retrieval and use of that data.
Introduction to Databases and Database Languages
Property Custodian Meeting July 10, Review of USM Internal Auditor Findings  Excerpt from the USM Internal Auditors report dated May 31, 2012:
Microsoft Windows 2003 Server. Client/Server Environment Many client computers connect to a server.
Chapter 1 Database Systems. Good decisions require good information derived from raw facts Data is managed most efficiently when stored in a database.
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
WHAT Exam Practice WHY All MUST Most SHOULD Some COULD Be able to understand the requirements of the exam to achieve a grade D Be able to understand the.
Easy update New security features Batch enhancements Improved buying and DSD module Margin, markdown and forecast Label printing automation More synchronizing.
Database Applications – Microsoft Access Lesson 2 Modifying a Table and Creating a Form 45 slides in presentation Accessibility check 9/14.
Systems Analysis – Analyzing Requirements.  Analyzing requirement stage identifies user information needs and new systems requirements  IS dev team.
CIS 103 — Applied Computer Technology Last Edited: September 17, 2010 by C.Herbert Wireless Home Networks.
Mail merge I: Use mail merge for mass mailings Perform a complete mail merge Now you’ll walk through the process of performing a mail merge by using the.
CERN Accelerators Topology Configuration and Change Management Engineering Department Thomas Birtwistle, Samy Chemli – EN/MEF/DC.
Project management tools Tiia Uusimäki. Agenda Activity Planning Tool and Earned Value Management – Why are the tools needed? – Activity Planning tool.
VistA Imaging Capture via Scanning. October VistA Imaging Capture via Scanning The information in this documentation includes only new and updated.
Simplifying the Configuration of Student Laptops — StirlingVPNSetup Simon Booth University of Stirling Laptop Forum 27th June 2006.
NUOL Internet Application Services Final Presentation 24 th of May, 2004.
QuikTrac 5.5, a validated Motorola Software Solution, allows you to take your Host ERP screens and extend them out to fixed or mobile devices including.
TECHONOLOGY experts INDUSTRY Some of our clients Link Translation’s extensive experience includes translation for some of the world's largest and leading.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Operating Systems Networking for Home and Small Businesses – Chapter.
UNOCODE 299 Copyright Silca S.p.A UNOCODE 299.
Capital Asset Management May 14, 2008 Today’s Presenters: Anna Jensen, Director of Auxiliary Accounting, Capital Asset Management, Accounts Receivable,
3 / 12 Databases MIS105 Lec13 Irfan Ahmed Ilyas CHAPTER Prepared By:
Margarita Saifoulina BE/RF/SR. Outline Data Management EDMS & MTF for RF structures Future prospects for EDMS/MTF solution Data Management EDMS & MTF.
LEADS/EMS DATA VALIDATION IPS MeteoStar December 11, 2006 WHAT IS VALIDATION? From The Dictionary: 1a. To Make Legally Valid 1b. To Grant Official.
Lesson 3.  Use of computers in recording, classifying, manipulating, and summarizing data.  Also called Automatic data processing, data processing,
ISO/IEC 27001:2013 Annex A.8 Asset management
Data Collection. Data Capture This is the first stage involved in getting data into a computer Various input devices are used when getting data to the.
7 - 1 PowerPoint Authors: Susan Coomer Galbreath, Ph.D., CPA Charles W. Caldwell, D.B.A., CMA Jon A. Booker, Ph.D., CPA, CIA Cynthia J. Rooney, Ph.D.,
New Comers Information Emanuele Piemonti Spalazzi & Gaetan Richaud EN-GMS-Adm
Learning Objectives Understand the concepts of Information systems.
Chapter 6 Discovering the Scope of the Incident Spring Incident Response & Computer Forensics.
Quality assurance - documentation and diagnostics during interventions Corrective maintenance seen from the Technical Infrastructure operation Peter Sollander,
Purchase Orders Notes:.
Midwest alio ® Conference November 13-14, 2013 Fixed Assets Michael Williams.
1 Information Governance (For Dental Practices) Norman Pottinger Information Governance Manager NHS Suffolk.
TMP3413 Software Engineering Lab Lab 01: TSPi Tool Support.
1 State of Georgia (GTA) Desktop Inventory Workshop March 16, 2009 © 2009 IBM Corporation IBM.
2-December Offline Report Matthias Schröder Topics: Monte Carlo Production New Linux Version Tape Handling Desktop Computers.
Laboratory equipment Dr. W. Huisman Cairo, November 21th 2012.
Tool Support for Testing Classify different types of test tools according to their purpose Explain the benefits of using test tools.
Software Engineering Process - II 7.1 Unit 7: Quality Management Software Engineering Process - II.
COBIT. The Control Objectives for Information and related Technology (COBIT) A set of best practices (framework) for information technology (IT) management.
( ) 1 Chapter # 8 How Data is stored DATABASE.
Perform a complete mail merge Lesson 14 By the end of this lesson you will be able to complete the following: Use the Mail Merge Wizard to perform a basic.
Computer Basics 1 Chapter One Computer Basics Part 1.
Chapter 7. Identifying Assets and Activities to Be Protected
Equipment Inventory Management
Always Connected introduces Tigo SMART 3.0 This guide is interactive!
Actual Postings Financial accounting Materials mgmt Controlling
Renovation of the Accelerators Controls Infrastructure and its Assets Management Asset and Maintenance Management Workshop November 14th, 2013 Cl.Dehavay.
Acer Technical Support Number
Programmable Logic Controllers (PLCs) An Overview.
Network Models, Hardware, Protocols and number systems
Always Connected introduces Tigo SMART 3.1 This guide is interactive!
DATA RECORDS & FILES By Sinkala.
Website Testing Checklist
Presentation transcript:

EN Inventory Emanuele Piemonti Spalazzi EN-GMS-Adm

Goals 2 Assess the volume and value of our assets in order to comply with the inventory rules laid down by the FP Department Keep an up-to-date inventory of the installed desktop equipment Simplify the inventory process Enhance the traceability of goods during their life-cycle EN-GMS-Adm

Means 3 List of inventorial items Inventory application (AIS inventory tool) Automatic update between Network Database and AIS Inventory tool (locality, users) Users’ Check List Inventory labels EN-GMS-Adm

List of Inventorial Items 4 All these items must be included in the inventory:  computers  laptops  printers  scanners  tablets  smart phones  IP phones  audio/video conference equipment  video projectors  large-format televisions  bar-code readers  oscilloscopes  circular saws  grindstones  vacuum cleaners  drills  toolkits  bicycles and mopeds EN-GMS-Adm

AIS Inventory Tool 5 The electronic inventory of all goods belonging to the Departments is managed using the Inventory (Foundation) applicationInventory (Foundation) application Main strenghts: Link between procurement orders and the entries in the inventory Anomalies detection and modification Electronic Users’ Check-List EN-GMS-Adm

Link between procurement orders and inventory EN-GMS-Adm The Inventory application provides a list of the goods bought within their Department via: stores orders external orders interdepartmental transfers (TIDs) NETOPS (database of computer equipment) The inventory manager selects the items to be entered in the inventory according to: the list of material that is required to be inventoried the sensitivity of the item concerned. Problems: Duplicates (automatic insertion vs. manual insertion) Misleading items names (link between procurement orders and inventory based on “Item Description”) Third party orders (difficult to identify the actual user of the item)

Anomalies detection and modification (1) 7 The are several means to detect (and correct) anomalies in the inventory : «PC differences with netops» : this AIS Inventory Tool feature helps detecting all inconsistencies between the Network Database and the inventory (different address, user, serial number, PC/Telephone name). Corrections need to be done manually «Users/ Keepers/ Departments» : this feature shows all items belonging to a User/ Keeper which is no more at CERN has changed Department Corrections have to be done manually EN-GMS-Adm

Anomalies detection and modification (2) 8 «Receive transfers»: following a change of a User’s Department, this feature allows to receive all items which have been transfered to our Department by his former Department. «Network» : this feature allows to detect all items which are in the Network Database and NOT in the Inventory (Double check system) Automatic update between the Network Database and the Inventory (only for User’s name and address) Important: For this feature to be useful and reliable, the Network database has to be up-to-date and all modifications need to be entered  need for procedures Weakness: automatic update based on “Serial number” (this information is not compulsory in the Network Database)  need for procedures EN-GMS-Adm

User Check List (1) 9 From this year, we have started using the electronic check list provided by the AIS Inventory Tool in order to ask all users to verify the items entered under their name in the inventory. More precisely Users are allowed to: modify an item type, maker, serial number, location change the User name or Keeper name suppress an article from their inventory list by selecting the appropriate suppression code add new articles which are not listed in their inventory EN-GMS-Adm

User Check List 2 10 All check lists are processed manually. Relevant modifications are verified (with the collaboration of the Computing Linkpersons) before being validated: Theft/ Loss  We ask for the Declaration of the Theft/ Loss Obsolete  We verify when the item was bought and if it is still connected to the Network Database Change of User/ Keeper  We inform the new User/ Keeper about the change Change of location  We check if the new location is consistent with the Network Database New item  We verify if the item is not already in the inventory (serial number) EN-GMS-Adm

Example EN-GMS-Adm

Labels 12 In order to enhance the traceability of all inventoried items during their life-cycle, we are introducing a labeling system. All inventoried items will have to carry a label with their inventory number. In few weeks, we will produce and send more than 2500 labels (all users will receive their labels together with their inventory list and some instructions) EN-GMS-Adm

Improvements in the inventory management 13 In conclusion several improvements have been made to our inventory management: There are now 3 different means to detect all inventoriable items (link between procurement orders and inventory in AIS Inventory tool, new items entered by the user in the check lists, «Network» feature in AIS) Most anomalies can be detected and corrected The automatic update of some information (user’s name, location) in the inventory according to the Network Database simplifies the inventory process. The two databases are also more consistent The electronic check lists are much easier to handle, more user- friendly and environmental-friendly A labelling system will guarantee a more reliable inventory (and it will be much easier to check) EN-GMS-Adm

Things still to improve EN-GMS-Adm Duplicates (automatic insertion vs. manual insertion) Reliability (link between procurement orders and inventory based on “Item Description”; automatic update based on “Serial number”) Users’ Check-lists compatibility problems Procedures to standardize PC orders (the final user must be mentioned), to assure that relevant information are entered in the Network Database (serial number) and that this latter is up-to-date (ex. departure of a user)

EN-GMS-Adm