logo

Report On Trusty Carpets | Enhancing The Profit Margin

   

Added on  2019-09-30

65 Pages16269 Words492 Views
Executive SummaryThe report is based on the case study on Trusty Carpets, which is a small firm selling carpets from past two decades. Different technologies used in the firm are router, printer, internet but no information system is being utilized. Trusty carpets have Metro Carpets, and aims to make optimum use of the space of the showroom and warehouse. In order to provide a better outlook, environmental analysis have been done, which have highlighted the opportunities and threats for the Trusty Carpets. Trusty Carpets wants to efficiently merge all consumer and sales components into uniform business operations. The aim of the report is to recommend appropriate technologies for enhancing the profit margin, so that the organization can expand and grow. It have been identified after analyzing the business operations of the organization that problem lies in the networks of communication, infrastructure related to IT is weak, there is more requirement of personnel for maintenance, suppliers relations need to be enhanced and the overall business strategy should be in line with the business operations. Solutions have been suggested for the problems of Trusty carpets in the report. The organization needs to implement customer relationship software named SalesfroceIQ, which will help the organization to combine all the business operations under one. The implementation of the CRM software will enhance sales and customer service and will enhance overall business outcomes. Besides this the software will also be helpful in the unification of the business, increased employee motivation and smooth functioning of the business. It have been analyzed that the implementation of the CRM software is feasible and will also utilize the various resources optimally. Annual cost of implementation of the CRM software in the Trusty Carpets will come to $900.

The report also suggests alternative solution to the organization for the improvement of the business processes without any IT solution. Proposed alternative solution for Trusty Carpets is that it needs to improve its vision statement and all the significant parts of the business needed tobe defined well and appropriate time should be given to effectively merge the newly acquired Metro Carpets. It have been analyzed the alternative solution for the organization is feasible but is not as optimal as CRM software. For making the implementation of the software successful the organization needs to provide training to the staff. Besides this all the technical requirements such as internet, device configurations, operating system, control on access, security in terms of network and transactionsshould be ensured for making the implementation successful. All the stakeholders like such as employees, managers and clients should be made aware and included in the development of the project. At the end of the report, it have been suggested to the organization that it should manage change efficiently, should integrate the business process requirements with effective training.

Table of ContentsExecutive Summary.....................................................................................................................................0I. Background and Environmental Analysis..................................................................................................6Background:.............................................................................................................................................6Environmental Analysis:.......................................................................................................................7Opportunities:......................................................................................................................................7Factors:................................................................................................................................................8Threats:................................................................................................................................................8II. Business Problem....................................................................................................................................9III. Proposed Solution:...............................................................................................................................11IV. Expected Improvements......................................................................................................................12V. Alternatives Analysis.............................................................................................................................14Analysis: Status Quo..............................................................................................................................14Analysis: Proposed System....................................................................................................................15Solution Description..........................................................................................................................15Major Benefits...................................................................................................................................16Cost Elements....................................................................................................................................17Feasibility...........................................................................................................................................17Risks...................................................................................................................................................18Major Issues.......................................................................................................................................18Analysis: Alternative Solution................................................................................................................19Solution Description..........................................................................................................................19Major Benefits...................................................................................................................................19Cost Elements....................................................................................................................................20Feasibility...........................................................................................................................................20Risks...................................................................................................................................................20Major Issues.......................................................................................................................................21Analysis: Improve Business Processes without an IT Solution...............................................................22Solution Description..........................................................................................................................22Major Benefits...................................................................................................................................22

Cost Elements....................................................................................................................................23Feasibility...........................................................................................................................................24Risks...................................................................................................................................................24Major Issues.......................................................................................................................................24Solutions Comparison Chart..................................................................................................................25Justification of Proposed System...........................................................................................................26VI. Feasibility Analysis................................................................................................................................27Economic/Financial Feasibility...............................................................................................................27Organizational/Operational Feasibility..................................................................................................27Advantage of the proposed system in solving problems...................................................................27Easy integration of the proposed strategy.........................................................................................28Necessity for additional staffing........................................................................................................28Necessity for reducing staff...............................................................................................................28Requirement of Staff reorganization.................................................................................................29Feasibility of retraining......................................................................................................................29Technical Feasibility...............................................................................................................................29Assurance of Expected Functions......................................................................................................29Solution Integration...........................................................................................................................30Implementation.................................................................................................................................30Training..............................................................................................................................................31Management.....................................................................................................................................31VII. Requirements Checklist.......................................................................................................................31Introduction...........................................................................................................................................32Data Requirements................................................................................................................................32Functional Requirements.......................................................................................................................33Technical Requirements........................................................................................................................33Internet Connection...........................................................................................................................33Browsers............................................................................................................................................34Outlook..............................................................................................................................................34Operating System..............................................................................................................................35Device Configurations.......................................................................................................................35Security Requirements...........................................................................................................................35

Authentication and Access Control....................................................................................................35Network Security...............................................................................................................................35Secure Communications & Reporting...............................................................................................36Transactional Security.......................................................................................................................36Information Security..........................................................................................................................36VIII. Context Diagram.................................................................................................................................37Section IX: Project Management...............................................................................................................37Project Scope.........................................................................................................................................37Time/Schedule.......................................................................................................................................38Cost........................................................................................................................................................38Quality...................................................................................................................................................39Communications....................................................................................................................................39Stakeholders..........................................................................................................................................40Project manger.......................................................................................................................................40Project board..........................................................................................................................................40Project team members...........................................................................................................................41Other......................................................................................................................................................41Major tasks and timeframe...................................................................................................................41Section X. Acquisition Strategy..................................................................................................................42Scope of what to buy:............................................................................................................................42Product Hardware and Service Software...........................................................................................42Commercial-off-the-shelf products....................................................................................................43Support for Custom Development.....................................................................................................43Required Infrastructure..........................................................................................................................44How will system hosting services be needed?...................................................................................44How will connectivity be made available?........................................................................................45What security considerations should be included in the contracts? Will any specific hardware or software need to be acquired to provide security?.............................................................................45Will business Continuity requirements need to be included in the contract(s)? Will separate BusinessContinuity solutions or components need to be acquired?.................................................................46Are there any data management considerations to be included in the acquisition(s)?........................47What type of contract(s) should be used?..........................................................................................47

Section XI: Risk Management...................................................................................................................48Section XII. Security.................................................................................................................................48Data.......................................................................................................................................................48Application Software.............................................................................................................................49Systems.................................................................................................................................................49Networks...............................................................................................................................................50Physical facilities related to IT..............................................................................................................50Mechanisms (Policy, Procedure, Technology Solutions, etc.) to protect against each of the issues......50Section XIII: Additional Implementation Issues.........................................................................................52Culture Change......................................................................................................................................52Salesforce Application Development.....................................................................................................52Insufficient Training...............................................................................................................................53Conclusion.................................................................................................................................................53Appendix...................................................................................................................................................55References.................................................................................................................................................63

I. Background and Environmental AnalysisBackground:Trusty Carpets (TC) has been a successful small-business organization in selling carpets for 20 years with a potential to become a bigger corporation in the future. TC has small number of employees including the owner, Jerry Montgomery and his daughter who would like to take overthe business once Jerry retires. Currently, TC has a healthy profit of $100,000 by selling 250,000 square feet of carpet in a year. TC’s monetary transactions such as paying bills, sendinginvoices, collecting payment and payroll are handled by an accountant. Technologies used at TC are basics such as printer, router, internet, tablet computers and so on. There is no commercial software or information system where all the employees are connected. All the employees have Gmail account from which they carry the business processes such as checking the availability of the selected carpet and the current price. Currently, there is no designated IT employee, however, one of the salesperson, Ben handles the IT-related queries at TC. Recently, Mr. Montgomery has acquired Metro Carpets (MT) which is on the other side of the town. Bigger than TC, Mr. Montgomery plans to utilize the large space of Metro Carpets in the best feasible way. The MT’s annual revenue of $3 million is very lucrative for Mr. Montgomeryas he aims to expand his carpet business. In addition, he has also decided to partner with Mike’s carpet installation business. Mr. Montgomery wants to contribute to the environment by emphasizing on recycling carpets when he merges with the installation business. To gain competitive edge, Mr. Montgomery needs a good planning and implementation to run all three businesses successfully.

Environmental Analysis:Mr. Montgomery has two facilities; Trusty Carpets and Metro Carpets. His well-established primary facility, Trusty Carpets, is located within a busy strip mall and it generates $1.2 million in annual revenue. This facility is small in both space and employees, as only Mr. Montgomery and 2 sales people work there at any given time. He also employs a single accountant to monitorhis finances, pay bills, send invoices, collect payment, and do payroll. Trust Carpets has a very basic IT system used for essential business tasks. The system is comprised of a multi-purpose printer connected to a router which provides a private wireless network. Furthermore, the 2 salespeople each have tablet computers which utilize the Google cloud to create and check customer orders. The second facility is Metro Carpets and is a recent acquisition. This facility is significantly large than Trusty Carpets as it is a standalone store with an adjoining 20,000 square foot warehouse and large showroom. The warehouse is currently at half-full capacity. Metro has 3 sales and 2 warehouse staff. Metro currently generates about $3 million in annual revenue.Mr. Montgomery also intends to merge his business with his brother-in-law’s carpet installation business. He plans to do this after they have reviewed the EPA’s WARM program. Mike’s (Mr.Montgomery’s brother-in-law) wife Carol does the bookkeeping for his company and she is very organized. Opportunities:With the large warehouse acquired through the purchase of Metro Carpets, products can be stored on site allowing for much faster transactions.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Business Process Management Solution for Trusty Carpet Store
|7
|921
|237

Unifying Sales and Customer Components of Trusty Carpets with SalesforceIQ CRM
|4
|2304
|494

Determine and submit a solution to the Business Problem.
|4
|2188
|168

CRM Solution for Trusty Carpets: A Proposed Solution for Unifying Business Components
|5
|2403
|155

Trusty Carpets qwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwerty
|6
|1302
|431

Security Measures for Trusty Carpets' Proposed Solution
|6
|2486
|145