Solved

Spare Parts Policy?

Posted on 2008-10-29
2
350 Views
Last Modified: 2008-11-05
Does anyone have any links to resources discussing best practices for implementing a Hardware Reserve Policy?

I'm talking about things like:

Fully imaged workstations, Blackberries, Mice, Keyboards, monitors, cables, memory, hard disks, graphics cards etc.

Is there such a thing as maintaining a X% reserve level for each part?

Thanks in advance
0
Comment
Question by:AbbeyCapital
2 Comments
 
LVL 13

Accepted Solution

by:
Rowley earned 125 total points
ID: 22832690
The calculation you need to make is one of cost/downtime/impact and opportunity cost. How much will part X cost you if unavailable for X time? If a users mouse fails, is it critical? It might be if that user is a trader for example.

Same could be said of a disk. If you lose one disk in a RAID set, for how long are you prepared to run the risk of catastrophic failure? Could you afford to wait 2 days for a part to ship? What if the second disk fails? How much time, effort and lost revenue would 1 hour, 1 day, or 1 weeks downtime cost? What impact would this failure have?

The opportunity cost might reasonably be considered to be mainly monetary.

So in my humble opinion, there is no hard and fast rule. You need to analyse the needs of your business/users/whatever and make decisions based on your needs.

hth.
0
 
LVL 6

Expert Comment

by:Twisteddk
ID: 22849439
I agree with Rowley in terms of "local" support. However, if you're a reatiler, I usually recommend that you keep at least 1 of everything in stock that you'd normally sell within a normal month. However, once the part becomes obsolete you should aim at replacing with recent parts, so as to not clutter up your storage with oboslete parts. Even if you get a replacement from the manufacturer a month or two later, you can just sell these discounted, or simply write them off.
0

Featured Post

U.S. Department of Agriculture and Acronis Access

With the new era of mobile computing, smartphones and tablets, wireless communications and cloud services, the USDA sought to take advantage of a mobilized workforce and the blurring lines between personal and corporate computing resources.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
tv problems 3 54
Cannot type when connected to devices using a Serial Port 4 40
Server backups 5 59
VSphere Hardware level 9, what avanced features require web client 5 46
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
As cyber crime continues to grow in both numbers and sophistication, a troubling trend of optimization has emerged over the last year.
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

840 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question