SME company is known access-based
control ABC is providing different solutions for the building’s pest control. The
product provided by the company finds application mainly in school swimming
pools gyms and SME companies. The VR
reader is emerging as a new technology that has plenty of opportunities to find
activities of a new product (Aubert, Patry, & Rivard, 2002). The VR reader
provides opportunities to the company, therefore, the company is considering it
as a new product. The main issue faced by the company is the capacity issue
that requires the Outsourcing of design and manufacturing process of VR reader (Aktas & Ulengin, 2005). After Outsourcing
the design and components of the VR reader, the components will be manufactured
from outside sources and the final assembly of the product will be done by the
company. The main objective of the present work is to determine the Outsourcing
process possibilities and to identify the manufacturing activities of VR
readers (Claver, González, Gascó, & Llopis, 2002). The present work
proposes an ideal design and configuration of a VR reader that enhances the
working efficiency of the basic control system. The important characteristic of
VR reader is vandal Resistance and this feature can be enhanced by considering
different processes (Claver, González, Gascó, & Llopis, 2002).
The current design of
VR-Reader and challenges
The VR readers can be installed easily
and have applications because it provides maximization of the interaction of
the user with the access control system. Processes of VR reader enhance the
interaction of the user with the door. Most of the models of VR reader provided
by the Companies consist of multi tone buzzer for the verification of audio and
leads. Information regarding access control system is provided by the multi-color
light frame (Doorentrydirect. com, 2019). The configuration of
VR reader depends upon the application and indicators can be configured
according to these applications. The Automatic, as well as inbuilt light
sensors, are developed in the VR reader is the display brilliance of card
reader. The configuration of all the
system security and VR reader depends upon the secure DESfire encryption keys (Sdmmag. com, 2018).
The source control system basically
provides services to the basic control system of doors. The process is based on
selective restriction to the access of the user. The prime role of the reader
is to identify that user and then allows access. The basic control system is composed
of the following elements; tokens (cards and key-fobs), reader, control unit,
lock, door, and exit button. The source
control system works based on credentials provided by the users a mechanical
key. The credentials are of different types including key fobs and access cards
(Sdmmag. com, 2018). The working principle of VR reader
depends upon insertion of the token and the identification of this token based
on the generation of radiofrequency waves. The change in radio frequency waves
is identified by the controller. The role of card and token is an inductor that
modifies the electromagnetic field created by the reader (Baldwin, Irani, & Love, 2001). The signal received
in this process is then sent to the control unit that decides about the
validation of the card. If the card is valid the access control unit will allow
opening the door otherwise the door main close. The access control system
requires cards only in case of entering the user while on the other hand, the
exit button unlocks the door without any credential (Aron, Clemons, & Reddi, 2005).
The essential characteristic of VR
reader is Vandal resistance ability that is resistant to any kind of damage, removal
by hand, spoiled by any liquid, burn resistance in case of any fire, and stone
effects. The important feature of the reader is to identify and capture a wide
range of credentials that can be used in the maintained and installed system. The
current is not sufficiently providing the accurate access control of doors and
the activation system requires modifications in the architecture of VR-reader.
Some important features of the current system are listed below in table 1.
Figure 1: Component of
current VR reader
Table 1: Features of
the current VR reader system
Components
of the VR reader
|
Component
No.
|
Component
|
1
|
Front cover
|
2
|
Reader module
|
2.a
|
Housing front
|
2.b
|
Cover
|
3
|
Housing back plate
|
4
|
Coil
|
5
|
Exciter
|
6
|
Power connection
|
7
|
Back plate
|
Major design changes
The access control system can be
modified on the basis of requirements of customers. The modification of VR
reader is based on specified features that are listed below,
1. 250.000
activations during product life (5 years).
2. Min.
operations distance of 10 mm
3. Max.
the operational distance of 50 mm
4. Reader’s
price must not exceed £50
The customized design can be
developed based on features, minimum and maximum distance for the operation and
optimized price. The design can be modified by inserting the key features of
Integrated GDX indigo Proximity access options. The optimized designs satisfy
the minimum requirement of operation and work more efficiently as compared to
the previous VR reader. Some features of Integrated GDX indigo Proximity access
options are borrowed to develop accurate door entry system (Pacgdx. com, 2019). The proposed design provides valuable
access to the ROI, reduces the maintenance as well as administration cost. In
the specified range of GDX5, there are three options to be considered such as
Indigo integrated within GDX5 Door Entry, Standalone Indigo Proximity Access,
and PAC integrated within GDX5 Door Entry. According to our requirement of
activation product life, minimum and maximum operational distance, and price of
reader services the most suitable condition is to modify the previous system by
improving the features according to Integrated GDX indigo Proximity access
options (Doorentrydirect. com, 2019).
Key value attributes
(KVA)
The proposed design features include
less cost of maintenance, controlled system, low cost installation, increased
spare holding. The system eliminates unnecessary expenses as well as the
complexity of the system and works on the principle of two separate operating
systems. The major advantage of using the integrated system is to upgrade the
previous design and to develop a central administration point that considers
all the access to doors (Aubert, Patry, & Rivard, 2002). The unbeatable
advantages by changing equipment features make the system more reliable. The
administration system and the central lock system of the PC are based on the administration
software platform and work by mobile GSM network. The central control platform
by the modified system provides an audio control system, monitoring system and
central control (Aubert, Patry, & Rivard, 2002). The key value
attributes of the modified system are listed below,
1. The
proximity access reader is directly related to the audio panel.
2. No
additional cabling process required for the operation of the system
3. Standalone
vandal resistant
4. Up
to 1,000 users of the token per reader
5. Nearly
40 readers per system
6. Optimized
size of the 10mm token
7. Color
coded tokens for the specified identification process
8. The
slave readers can be connected for read-in and read-out operations
9. Administration
of master token for the entrance panel
10. Available
at 7A and 3A PSU
11. Bi-directional
reader
12. Single
lock sheet metal steel (H: 350 mm W: 350
mm D:100 mm)
Outsourcing of new
design
Outsourcing of the product design plays
an extensive role in the customer service and manufacturing of the product. In the present case, the design
conditions are provided by SME company and the purpose of outsourcing is to
arrange the components of VR readers by other manufacturing sources (Aron, Clemons, & Reddi, 2005). The company will
assemble all the components to produce a final product but due to capacity issues,
the manufacturing process requires outsourcing of design and basic components
of VR reader (Aron, Clemons, & Reddi, 2005).
SME
company is facing challenges such as capacity issues for the production process,
skill and competencies, and in the delivery of high quality and innovative
services. SME company can collaborate with other companies for the outsourcing
of the new design and to consult with the engineers for the production process.
The specified design of VR reader provided by SME company can be developed by a
number of suppliers and companies (Osha. gov, 2018).
Pros and Cons of
outsourcing
The benefits of outsourcing include the
cost optimization of VR reader and increases productivity. The business
requires additional support that drains some focus and to accelerate the
manufacturing process. The downsides of outsourcing are a loss of control on
the production process and on the accuracy of the product (Userlike. com, 2014). The feedback
spillover loss also reduces efficiency and customer satisfaction level. Besides
the cons, the outsourcing of design and manufacturing of individual components
can enhance the working efficiency of the company. The critical issues of
capacity can be reduced by increasing the production process at other outsourced
companies (Userlike. com, 2014).
Criteria of selection
for outsourcing of design
The process of outsourcing
information related to the production process requires considerations. The
criteria for selecting the suppliers and service providers are specified in the
present study. The supplier must be able to provide an accurate and optimized
design of the VR reader. In order to identify the required supplier for the
outsourcing of the design, there must be a specified criterion of selection (Innovation-management. org, 2018). SME Company can
address the challenge of capacity issues and can characterize the appropriate
supplier through optimization of supplier performance and learning initiatives.
The criteria of selection for outsourcing of design is mentioned below,
1. The
supplier must be able to deliver a wide range of projects. The workers and
technical staff must have some profound experience in designing access control
systems (Hiles, Andrew, 2010).
2. The
supplier must be able to deliver innovative technology through modern digital
learning processes. Specialized and skill capabilities should be reliable for
the contract.
3. The
service cost and designing cost should be limited and the agreement with the
supplier should be cost effective (Corpcomputerservices.com, 2017).
4. The
external agency should be reputed and managed to provide a quick response to
the queries and services. The schedule of delivery and order must be followed
in any hard and fast conditions. The supplier should be able to deliver the
services in the minimum time possible (Claver, González, Gascó, & Llopis, 2002).
5. The
focus of the supplier should be on the high-performance business, by
outsourcing the design of VR Reader, SME company should be able to maintain the
strategy and production of VR Reader should be beautiful, effective and
remarkable (Baldwin, Irani, & Love, 2001).
6.
Integrate additional parts information are related knowledge on every
portion, it needs to include the system with medical info or textual. Thus, if
the dealers was moving or facing the portion of the VR reader than must have to
get knowledge about this. Thus, the suppliers can learn what exactly 611 the
particular part is about. As the range of the knowledge by the information of
Meta from various part of the machine used in it, while the limits for the
particular part might be needed to the part of the tools, as it complete the
requirement of MR 8 - MR 11. As it plan the principles cannot provide it in
works almost the design principles of VR reader. Though, as it openly inquired through
specialists in the workspaces or through the media psychology or the education.
7.
It is dissimilar link with the portion or sections machines that needs,
it is the major part of system. While the VR reader scheme interact, as it is
the prime part that enabling the dealers that they understand or learn. As
there is the extraordinary courtesy nearly as it interact with the crucial
system. As this principle design to contribute MR 3 to MR 6.
Typical suppliers to
outsource design
The collaboration with other companies
can extend the product quality and the convenience in the security system can
be improved. Based on the new and optimized design as proposed in the present
work SME company can outsource the design and information regarding
manufacturing process with KANTECH system Inc. or GDX Door entry (Pacgdx. com, 2019). On the basis of
typical criteria of selection for outsourcing the design the most suitable supplier
is GDX that is a product brand of Stanley security products. Stanley Security
products is also a part of Stanley, Black, and Decker Inc. GDX provides an
extensive range of services for the access control system applications,
solutions and variety of services as well (Doorentrydirect. com, 2019). Currently, GDX is
dealing with 300 dealers and distributors on an international level. The
company provides quality services, technical support, and customer services for
the customers. The versatile solutions provided by GDX are scalable, suitable,
and helpful for the application in different environments (Pacgdx. com, 2019). The installation of the integrated and
web-based system provided by GDX increases the robust functionality,
reliability, and meet the other specific and rigorous demands for the customers
and for the commercial market sectors (Doorentrydirect. com, 2019).
The technical support team, GDX design,
and manufacturing team are based in the UK that also provides services in Paisley,
Scotland. SME Company can consult the services of GDX as the company is already
providing services from the last 30 years in the designing and manufacturing of
door entry and access control systems (Pacgdx. com, 2019). The company is listed in top companies
for the delivery of services and in the market sector. GDX is offering services
in partnership with local and international companies. The change in technology
and the changing requirements can improve the functionality of the services and
product. GDX is providing higher level functionality of access control products
for the residential as well as commercial market sectors (Pacgdx. com, 2019). The functionality of the process is
based on Elegance styling and flexibility in the services and applications of
door entry control systems.
The focus of the companies to provide
solutions, design wale ability maintenance and installation of an effective
security system. SME Company can outsource the information about the design to
get verified services and more benefits for the digital audio distribution and
digital environment system applications (Doorentrydirect. com, 2019). GDX use a wide
range of equipment that is extensively supplied by the authorized distributors,
installers, and dealers. GDX ensures approved suppliers for the high levels of
support provided to the customers. The designs for services by GDX include a
full range of technical specifications, designs, and support (Doorentrydirect. com, 2019). On the basis of GDX
company analysis and the services provided by the company, it can be concluded
that SME company can outsource all the design information with GDX to develop
new security products. The system functionality increases with changing the
requirements, demands and associated legislation (Doorentrydirect. com, 2019; Pacgdx. com, 2019).
Criteria of selection
for outsourcing of manufacturing process
There are different criteria to suggest
the authentic outsourcing of information regarding the manufacturing processes.
The manufacturing process is the typical problem that requires concerned with
the experts for the accuracy of the project. In the present work, a specified
selection criterion for the outsourcing of the manufacturing process is
suggested for an SME company (Aubert, Patry, & Rivard, 2002). The most important
criteria for the manufacturing process are a cost-effective process that must
be considered for the scalable solution of the demand. The outsourcing of the
information can be helpful for the building of space control system and the
access control system (Learn kit. com, 2015).
1. The
cost of the manufacturing process should be less, and the company must provide
experts for the development processes and manufacturing processes of the
security systems (Aron, Clemons, & Reddi, 2005). The workers of the
company must be trained and should be capable of scalable solutions for the
security systems and VR Readers. The services should be provided to SME company
at the optimized level and without any additional cost (Aron, Clemons, & Reddi, 2005).
2. The
company should be able to provide leverages at best practices and new learning
solutions should be stagnant. The perspective regarding the deep understanding
of functionality and capability should be based upon the new technology and
excellence of learning should be invested on VR readers for the manufacturing (Learnkit.
com, 2015; Allan, 2002).
3. The
suppliers selected for the Outsourcing of the manufacturing process should have
a depth of perfect experience. The instrumental designs and learning space
should be able to provide products on a time with the highest of maximum
accuracy. There are diverse projects and processes for the manufacturing of VR
readers. The experience of suppliers can reduce potential challenges faced by
diverse projects (Learnkit. com, 2015; Aron, Clemons, & Reddi,
2005).
Typical suppliers to
outsource manufacturing process
SME company requires an authentic
company for the Outsourcing process of manufacturing of VR reader. On the basis of the selected criteria, there
are different companies that are providing consultancy as well as services.
KENTECH Consulting, Inc. Provides different kinds of security systems (Yuqio. com, 2018). The background of
the company has an excellent match with the over requirements. The company
provides experts that provide a diverse type of services. The workers of the
company have multi industry experience, therefore, they can provide services as
according to the requirements of SME company (Ekentech. com, 2019). KENTECH Consulting,
Inc. Offers customized solutions, sophisticated tools, security checkup, and
digital background for the development of innovative technology. The
manufacturing outside process consists of hiring new people outside of the
company or assemble them from another company to have a comparatively high
advantage (Ekentech. com, 2019; Kentech. ie, 2018). The adorable
process of outsourcing of manufacturing and production process of a company
provide the comparative advantages in the area of production. The growth of VR
Technology requires Technology experts and professionals in the security field.
KENTECH Consulting, Inc. Considers offers as well as applications from China
Japan Ukraine USA and UK for the consultancy in the practical work of security
system development. The main goal of the
company is to provide advance future to the production process and enhance the
technology aggressively (Ekentech. com, 2019). KENTECH Consulting,
Inc. is an appropriate option for SME company to outsource the manufacturing
process. The company met with the defined criteria and is listed in the top
companies as provided on the internet (Ekentech. com, 2019; Baldwin, Irani, & Love,
2001).
Conclusion on Outsourcing Study of Product Design and
Manufacturing Activities
Outsourcing is a technique to
accelerate manufacturing as well as production design process. In the present
work, there were main concerns including the development of the new or improved
design for VR readers and then to identify the outsourcing company for design
and for the manufacturing process. The production performance can be improved
by considering different processes because SME company is facing challenges of
capacity. The best solution to overcome the challenges is the outsourcing of
design and manufacturing. A number of companies are providing basis control and
access control system based on the credentials. SME is also providing an
access-based control system. As
the network technologies or the uses of computer, and it can’t delay for their
development, as to grow or explore in sync by them. Vigorously approving fresh
expertise not for the efficiency of the library work enhance, and also give the
various VR reader services. So, the virtual reality of the technology is for
the applications, as it is necessity that mix the technology of VR reader by
the links in the museum to the actual situation of every library, as it also
provide the best features services to the readers after using the VR reader
technology.
Before hitting any company for outsourcing
process, the selection criteria are proposed for outsourcing of the
information. In order to facilitate the customer with accurate services of
Access-based control, SME company can outsource design information of VR reader
product with GDX that can perform new design implementation of security
products. Similarly, on the basis of selection criteria of the company for
outsourcing of manufacturing defined KENTECH Consulting, Inc. as an appropriate
option to outsource the manufacturing process.
Aktas, E., & Ulengin, F. (2005). Outsourcing
logistics activities in Turkey. The Journal of Enterprise Information
management, 18(03), 316-329. Retrieved 11 21, 2017
Allan, A. (2002). Innovation Management:
Strategies, Implementation, and Profits . Oxford University Press.
Aron, R., Clemons, E. K., & Reddi, S.
(2005). Just Right Outsourcing: Understanding and Managing Risk. Proceedings
of the 38th Hawaii International Conference on System Sciences, 1(1), 1-10.
Retrieved 11 21, 2017
Aubert, B. A., Patry, M., & Rivard, S.
(2002). Managing IT Outsourcing Risk : Lessons Learned. Information Systems
Outsourcing, 1(1), 155-176. Retrieved 11 04, 2017
Baldwin, L., Irani, Z., & Love, P.
(2001). Outsourcing information systems: drawing lessons from a Outsourcing
information systems: drawing lessons from a. Operational Research Society,
10(1), 15-24. Retrieved 11 04, 2017
Claver, E., González, R., Gascó, J., &
Llopis, J. (2002). Information systems outsourcing: reasons, reservations and
success factors. Logistics Information Management, 15(04), 294-308.
Retrieved 11 04, 2017
Corpcomputerservices.com. (2017). IT
Outsourcing: The Reasons, Risks and Rewards. Retrieved 11 04, 2017, from
www.corpcomputerservices.com:
http://www.corpcomputerservices.com/articles/outsourcing-reasons
Doorentrydirect. com. (2019). GDX.
Retrieved from doorentrydirect.com:
https://doorentrydirect.com/gdx-door-entry-systems
Ekentech. com. (2019). ABOUT US .
Retrieved from www.ekentech.com:
https://www.ekentech.com/about-kentech-background-services
Hiles, Andrew. (2010). The Definitive
Handbook of Business Continuity Management. John Wiley & Sons.
Innovation-management. org. (2018). Choosing
an innovation model. Retrieved from innovation-management.org:
https://innovation-management.org/innovation-model.html
Kentech. ie. (2018). MEET THE TEAM.
Retrieved from www.kentech.ie:
https://www.kentech.ie/meet-the-team/1/sarah-kent.html
Learnkit. com. (2015, 05 30). 6 Reasons
Why You Should Outsource Elearning Development. Retrieved from
learnkit.com: https://learnkit.com/2015/07/30/6-reasons-to-outsource-elearning/
Osha. gov. (2018). Process Safety
Management Guidelines for Compliance. Retrieved from www.osha.gov:
https://www.osha.gov/Publications/osha3133.html
Pacgdx. com. (2019). World Class
Security Products. Retrieved from pacgdx.com: https://pacgdx.com/
Sdmmag. com. (2018). VANDERBILT READER
RESISTS HACKING. Retrieved from www.sdmmag.com:
https://www.sdmmag.com/articles/95665-vanderbilt-reader-resists-hacking
Userlike. com. (2014, 12 12). The Pro's
and Con's of Outsourcing your Customer Support. Retrieved from
www.userlike.com:
https://www.userlike.com/en/blog/the-7-pros-and-cons-of-outsourcing-your-customer-support
Yuqio. com. (2018, 03 21). VIRTUAL
REALITY AND OUTSOURCING. Retrieved from yuqio.com: http://yuqio.com/virtual-reality-and-outsourcing-3/