EDOCD Inventory Management System

1 INTRODUCTION

1.1 PURPOSE

Being better at tracking the stuff you have is a great way to make more money.

When you track your products, you can predict how much you’ll sell in the future, find them faster for your customers, and reorder before you run out of product. How novel!

One of the best ways to do all that tracking, predicting, and reordering is to use an Inventory Management System.

Inventory Management System software is used for tracking inventory levels, orders, sales and deliveries. Companies can use inventory management software to avoid product overstock and outages. It is a tool for organizing inventory data that before was generally stored in hard-copy form or in spreadsheets.

1.2 WHAT IS AN INVENTORY MANAGEMENT SYSTEM?

Inventory management systems track goods through the entire supply chain or the portion of it a business operates in. That covers everything from production to retail, warehousing to shipping, and all the movements of stock and parts between.

Practically, it means a business can see all the small moving parts of its operations, allowing it to make better decisions and investments. Different inventory managers focus on different parts of the supply chain—though small businesses are usually more interested in the ordering and sales end of the chain.

1.3 ADVANTAGES OF ERP INVENTORY MANAGEMENT SOFTWARE

There are several advantages to using inventory management software in a business setting.

Cost savings
A company’s inventory represents one of its largest investments, along with its workforce and locations. Inventory management software helps companies cut expenses by minimizing the amount of unnecessary parts and products in storage. It also helps companies keep lost sales to a minimum by having enough stock on hand to meet demand.

Warehouse organization
As businesses move away from pen and paper processes to automated solutions, visibility becomes a key factor in inventory management.

Inventory management software can help distributors, wholesalers, manufacturers and retailers optimize their warehouses. If certain products are often sold together or are more popular than others, those products can be grouped together or placed near the delivery area to speed up the process of picking.

By 2018, 66% of warehouses “are poised to undergo a seismic shift, moving from still prevalent pen and paper processes to automated and mechanized inventory solutions. With these new automated processes, cycle counts will be performed more often and with less effort, increasing inventory visibility, and leading to more accurate fulfillment, fewer out of stock situations and fewer lost sales. More confidence in inventory accuracy will lead to a new focus on optimizing mix, expanding a selection and accelerating inventory turns.”

Updated data
Up-to-date, real-time data on inventory conditions and levels is another advantage inventory management software gives companies. Company executives can usually access the software through a mobile device, laptop or PC to check current inventory numbers. This automatic updating of inventory records allows businesses to make informed decisions.

Data security
With the aid of restricted user rights, company managers can allow many employees to assist in inventory management. They can grant employees enough information access to receive products, make orders, transfer products and do other tasks without compromising company security. This can speed up the inventory management process and save managers’ time.

Insight into trends
Tracking where products are stocked, which suppliers they come from, and the length of time they are stored is made possible with inventory management software. By analysing such data, companies can control inventory levels and maximize the use of warehouse space. Furthermore, firms are more prepared for the demands and supplies of the market, especially during special circumstances such as a peak season on a particular month. Through the reports generated by the inventory management software, firms are also able to gather important data that may be put in a model for it to be analyzed.

2 PARTS OF INVENTORY MANAGEMENT SYSTEM

2.1 LOGGING ON AND LOGGING OFF

2.2 MANAGING USERS

2.3 MANAGING INVENTORY

2.4 MANAGING ACCOUNTS

2.5 MANAGING MATERIAL RECEIPT ENTRY

 

2.6 MANAGING MATERIAL ISSUE TO UNIT

2.7 MANAGING ITEM LEDGER

What is SSL and why you need it now?

Data transferred in plain-text form or in non-encrypted format can be intercepted, eavesdropped, compromised and stolen. Transactions performed online may involve submitting personal information such as credit card information, social security numbers, usernames and passwords. Cybercriminals who intercept unencrypted communications will gain full access to this data and can use it for fraudulent purchases and activities.

Trust and security are what make individuals sufficiently certain to give private, sensitive data on the web. SSL authentications are what make a site trusted. SSL stands for Secure Sockets Layer, the protocol which provides encrypted communications between a website and an internet browser. SSL Certificates are small data files that digitally bind a cryptographic key to an organization’s details and are typically installed on pages which ensure that any data transferred between users and sites, or between two systems remain impossible to read. It safeguards sensitive data being sent between two systems like credit card details or passwords, exchanged during each visit, which is called a session, from being intercepted from non-authorized parties. The two systems can be a server and a client (for example, a shopping website and browser) or server to server (for example, an application with personal identifiable information or with payroll information).

HTTPS (Hyper Text Transfer Protocol Secure) appears in the URL when a website is secured by an SSL certificate. The details of the certificate, including the issuing authority and the corporate name of the website owner, can be viewed by clicking on the lock symbol on the browser bar.

How it works:

The Secure Socket Layer protocol was originally created by Netscape. The protocol uses a third party, a Certificate Authority (CA), to identify one end or both end of the transactions. Let see how it works:

  • A browser requests a secure page (usually https://).
  • The web server sends its public key with its certificate.
  • The browser verifies that the certificate was issued by a trusted party (more often a trusted root CA), that the certificate is as yet legitimate and that the certificate is identified with the site reached.
  • The browser at that point utilizes public key, to scramble a random symmetric encryption key and sends it to the server with the encoded URL required and additionally other encoded http data.
  • The web server decodes the symmetric encryption key utilizing its private key and uses the symmetric key to unscramble the URL and http data.
  • The web server sends back the asked for html archive and http information scrambled with the symmetric key.
  • The program decodes the http information and html report utilizing the symmetric key and shows the data.

Thus the encryption using a private key/public key pair ensures that the data can be encrypted by one key but can only be decrypted by the other key pair. The keys are comparative in nature and can be utilized on the other hand: what one key encode, the other key pair can decode. The key pair depends on prime numbers and their length as far as bits guarantees the trouble of having the capacity to unscramble the message without the key sets. The trick in a key pair is to keep one key mystery (the private key) and to circulate the other key (the public key) to everyone. Anyone can send you a scrambled message, that lone you will have the capacity to decode.

Type of Certificates:

There are three basic sorts of certificates. Picking the correct one will be based on the level of security your site needs, for example domain-validated (low in security), organization-validated (medium), extended validation (high); property types you wish to protect (domain, sub-domain) and number of properties for which you need protection (wildcard or multiple domain).

  • Standard SSL & Extended Validation (EV) SSL – Standard SSL and EV SSL are both single-domain SSL (Secure Sockets Layer) certificate but the later ensures highest degree of authentication and requires more evaluation and documentation checks for applicant websites than the other.
  • Multi-Domain SSL – It offers the highest degree of authentication and protection using one certificate for many domains and sub domains.
  • Wildcard SSL – a Subject Alternative Names (SANs) secured Wildcard is a top choice for organizations managing multiple sites hosted across numerous sub domains.

Google’s disciplinary measures for non SSL websites:

For a considerable length of time, Google has been actively looking for approaches to urge site proprietors to actualize SSL certificates. Earlier Google follows a reward scheme in which it began ranking websites higher in search results if they had an SSL Certificate installed. At that time, SSL certificate was mandatory for web based business sites that acknowledged online buys and took users credit card details.

Recently, Google has moved from a reward system to a punitive one. Few months back, Google was blacklisting non-HTTPS websites that allowed password fields and credit card forms to be filled. From October, 2017 onwards Google Chrome browser began showing a “not secure” message on all websites that were running without an SSL certificate. In any case, with site security more essential than any time in recent memory, Google has chosen to “drive” all website owners to include this additional level of security, or pay the cost.

We’re here to help

If you’d like to talk further about your website’s security and how this might impact your business, we’re always available to help. Contact our office and speak to one of our friendly consultants should you have any questions.

References:

  1. http://www.tldp.org/HOWTO/SSL-Certificates-HOWTO/x64.html
  2. https://www.instantssl.com/ssl-certificate.html

 

 

How to Register IPR in India

According to the World Intellectual Property Organisation (WIPO), intellectual belongings refers to creations of thoughts: innovations; literary and creative works; and symbols, names and pictures used in commerce. It can be bifurcated into two categories :

1. Industrial assets which incorporates patents for innovations, commercial designs, logos, and geographical indications.

2. Copyrights which covers literary works (e.g. novels, poems and many others.), films, music and/or every other creative work.

As an inventor, proprietor or writer of such intellectual assets you have got rights, similar to in case of every other physical property. It prevents every person or entity to apply it without your permission in conjunction with giving due credit or even financial compensation.

To legally put in force such rights, you need to register your invention with the office of controller General of Patents, Designs & Trade Marks under Ministry of Commerce & Industry, Government of India.

File in your application as quickly as possible, as first-to-report rule is of great importance for registration of intellectual property. If two or more applications are identical or comparable only the the foremost application will be given importance for registration.

Patent implies a brand new product or procedure capable of industrial application. The product or procedure need to be a new invention that has not been used earlier than within the public domain. Time period for registered patents in India is 20 years.

Application for registration has to be filed inside the patents office of applicable territorial jurisdiction via the inventor either by self or through assigned legal representative. An important thing to understand is that those rights are territorial in nature and do no extend beyond the jurisdiction for which it is granted. If you want to reserve the IPR in different international boundries, then either you can file the patent application separately in countries of your preference or you can file Patent Cooperation Treaty (PCT) application simultaneously with application in Form-1.

In addition to Form 1 you need to fill Form 2 in which you need to mention the specification of your invention in detail and Form 3 and Form 5 in which you need to mention the details of any foreign filings for the same and a bonafide affirming that the product/process is your invention respectively.

Industrial Design

In accordance to WIPO, an industrial design refers to the ornamental or aesthetic aspects of an article. A design may comprise of 3-D features, such as the shape or surface of an article, or 2-D features such as patterns, lines or color. Industrial designs are applied to wide variety of industrial products containing distinctive features and handicraft items.

There is a separate Design Wing in the patent office under Government of India which oversees the registration process. The process is now online.You need to create an account,fill in the application, digitally sign the form (Form 5 and 44 ) and make the payment.

After the thorough examination, the copyright is granted, and the details of the same are entered into Register of Designs , maintained in the Patent Office. It contains parameters such as Name and address of the Proprieter , Design number, class number , date of filing, etc.

Any person can inspect the register after payment of prescribed fees.

Trademarks

A Trademark mark is a recognizable sign, design, or expression which identifies products or services belongs to or provided by certain individual or some legal entity.

A trademark identifies the brand owner of a particular product or service. Trademarks can also be licensed to others in order to earn revenue or brand proliferation. The unauthorized usage of trademarks by producing and trading counterfeit consumer goods is known as brand piracy. Regulation of Trademarks in India is governed under Trademarks Act, 1999. This Act is in compliance with World Trade Organization recommendations and Trade-Related Aspects of Intellectual Property Rights (TRIPS) Agreement.

You can obtain Trademark from Registrar of Trademark under the Office of Controller General of Patents, Designs & Trade Marks ,Government of India.The validity of Trademark is 10 years and you can again renew that for another 10 years.The Process of registration is now online.

To register follow the link ,create an account,fill in the application ,digitally sign the Form TM-1 and make the payment.

Like registration of Industrial Design, Trademark registration is also limited to certain territorial boundries. The Application is inspected for the uniqueness of the relevant mark ,whether is it enough to distinguish and differentiate an applicant’s good or service and whether it is prohibited for registration under any other law or is identical or similar to any existing marks. On successful grant ,the trademark is included in the Register of Trademark.

In case somebody wants to contest the grant of trademark, same should be intimated to the Office within 4 months from the date of publication in the official gazette.

Some important links:
(1)For e-Filling Patent,Design,GI etc.
(2)For Form and Fees.