Loading...

Messages

Proposals

Stuck in your homework and missing deadline?

Get Urgent Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework Writing

100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

An Outsourcing Study of Product Design and Manufacturing Activities

Category: Business Statistics Paper Type: Homework Writing Reference: APA Words: 3685


SME company is known access-based control ABC is providing different solutions for the building’s pest control. The product provided by the company finds application mainly in school swimming pools gyms and SME companies.  The VR reader is emerging as a new technology that has plenty of opportunities to find activities of a new product (Aubert, Patry, & Rivard, 2002). The VR reader provides opportunities to the company, therefore, the company is considering it as a new product. The main issue faced by the company is the capacity issue that requires the Outsourcing of design and manufacturing process of VR reader (Aktas & Ulengin, 2005). After Outsourcing the design and components of the VR reader, the components will be manufactured from outside sources and the final assembly of the product will be done by the company. The main objective of the present work is to determine the Outsourcing process possibilities and to identify the manufacturing activities of VR readers (Claver, González, Gascó, & Llopis, 2002). The present work proposes an ideal design and configuration of a VR reader that enhances the working efficiency of the basic control system. The important characteristic of VR reader is vandal Resistance and this feature can be enhanced by considering different processes (Claver, González, Gascó, & Llopis, 2002).

The current design of VR-Reader and challenges

The VR readers can be installed easily and have applications because it provides maximization of the interaction of the user with the access control system. Processes of VR reader enhance the interaction of the user with the door. Most of the models of VR reader provided by the Companies consist of multi tone buzzer for the verification of audio and leads. Information regarding access control system is provided by the multi-color light frame (Doorentrydirect. com, 2019). The configuration of VR reader depends upon the application and indicators can be configured according to these applications. The Automatic, as well as inbuilt light sensors, are developed in the VR reader is the display brilliance of card reader.  The configuration of all the system security and VR reader depends upon the secure DESfire encryption keys (Sdmmag. com, 2018).

The source control system basically provides services to the basic control system of doors. The process is based on selective restriction to the access of the user. The prime role of the reader is to identify that user and then allows access. The basic control system is composed of the following elements; tokens (cards and key-fobs), reader, control unit, lock, door, and exit button.  The source control system works based on credentials provided by the users a mechanical key. The credentials are of different types including key fobs and access cards (Sdmmag. com, 2018). The working principle of VR reader depends upon insertion of the token and the identification of this token based on the generation of radiofrequency waves. The change in radio frequency waves is identified by the controller. The role of card and token is an inductor that modifies the electromagnetic field created by the reader (Baldwin, Irani, & Love, 2001). The signal received in this process is then sent to the control unit that decides about the validation of the card. If the card is valid the access control unit will allow opening the door otherwise the door main close. The access control system requires cards only in case of entering the user while on the other hand, the exit button unlocks the door without any credential (Aron, Clemons, & Reddi, 2005).

The essential characteristic of VR reader is Vandal resistance ability that is resistant to any kind of damage, removal by hand, spoiled by any liquid, burn resistance in case of any fire, and stone effects. The important feature of the reader is to identify and capture a wide range of credentials that can be used in the maintained and installed system. The current is not sufficiently providing the accurate access control of doors and the activation system requires modifications in the architecture of VR-reader. Some important features of the current system are listed below in table 1.


Figure 1: Component of current VR reader

Table 1: Features of the current VR reader system

Components of the VR reader

Component No.

Component

1

Front cover

2

Reader module

2.a

Housing front

2.b

Cover

3

Housing back plate

4

Coil

5

Exciter

6

Power connection

7

Back plate

 

Major design changes

The access control system can be modified on the basis of requirements of customers. The modification of VR reader is based on specified features that are listed below,

1.      250.000 activations during product life (5 years).

2.      Min. operations distance of 10 mm

3.      Max. the operational distance of 50 mm

4.      Reader’s price must not exceed £50

The customized design can be developed based on features, minimum and maximum distance for the operation and optimized price. The design can be modified by inserting the key features of Integrated GDX indigo Proximity access options. The optimized designs satisfy the minimum requirement of operation and work more efficiently as compared to the previous VR reader. Some features of Integrated GDX indigo Proximity access options are borrowed to develop accurate door entry system (Pacgdx. com, 2019). The proposed design provides valuable access to the ROI, reduces the maintenance as well as administration cost. In the specified range of GDX5, there are three options to be considered such as Indigo integrated within GDX5 Door Entry, Standalone Indigo Proximity Access, and PAC integrated within GDX5 Door Entry. According to our requirement of activation product life, minimum and maximum operational distance, and price of reader services the most suitable condition is to modify the previous system by improving the features according to Integrated GDX indigo Proximity access options (Doorentrydirect. com, 2019).

Key value attributes (KVA)

The proposed design features include less cost of maintenance, controlled system, low cost installation, increased spare holding. The system eliminates unnecessary expenses as well as the complexity of the system and works on the principle of two separate operating systems. The major advantage of using the integrated system is to upgrade the previous design and to develop a central administration point that considers all the access to doors (Aubert, Patry, & Rivard, 2002). The unbeatable advantages by changing equipment features make the system more reliable. The administration system and the central lock system of the PC are based on the administration software platform and work by mobile GSM network. The central control platform by the modified system provides an audio control system, monitoring system and central control (Aubert, Patry, & Rivard, 2002). The key value attributes of the modified system are listed below,

1.      The proximity access reader is directly related to the audio panel.

2.      No additional cabling process required for the operation of the system

3.      Standalone vandal resistant

4.      Up to 1,000 users of the token per reader

5.      Nearly 40 readers per system

6.      Optimized size of the 10mm token

7.      Color coded tokens for the specified identification process

8.      The slave readers can be connected for read-in and read-out operations

9.      Administration of master token for the entrance panel

10.  Available at 7A and 3A PSU

11.  Bi-directional reader

12.  Single lock sheet metal steel (H: 350 mm  W: 350 mm D:100 mm)

Outsourcing of new design

Outsourcing of the product design plays an extensive role in the customer service and manufacturing of the product. In the present case, the design conditions are provided by SME company and the purpose of outsourcing is to arrange the components of VR readers by other manufacturing sources (Aron, Clemons, & Reddi, 2005). The company will assemble all the components to produce a final product but due to capacity issues, the manufacturing process requires outsourcing of design and basic components of VR reader (Aron, Clemons, & Reddi, 2005).

 SME company is facing challenges such as capacity issues for the production process, skill and competencies, and in the delivery of high quality and innovative services. SME company can collaborate with other companies for the outsourcing of the new design and to consult with the engineers for the production process. The specified design of VR reader provided by SME company can be developed by a number of suppliers and companies (Osha. gov, 2018).

Pros and Cons of outsourcing

The benefits of outsourcing include the cost optimization of VR reader and increases productivity. The business requires additional support that drains some focus and to accelerate the manufacturing process. The downsides of outsourcing are a loss of control on the production process and on the accuracy of the product (Userlike. com, 2014). The feedback spillover loss also reduces efficiency and customer satisfaction level. Besides the cons, the outsourcing of design and manufacturing of individual components can enhance the working efficiency of the company. The critical issues of capacity can be reduced by increasing the production process at other outsourced companies (Userlike. com, 2014).

Criteria of selection for outsourcing of design

The process of outsourcing information related to the production process requires considerations. The criteria for selecting the suppliers and service providers are specified in the present study. The supplier must be able to provide an accurate and optimized design of the VR reader. In order to identify the required supplier for the outsourcing of the design, there must be a specified criterion of selection (Innovation-management. org, 2018). SME Company can address the challenge of capacity issues and can characterize the appropriate supplier through optimization of supplier performance and learning initiatives. The criteria of selection for outsourcing of design is mentioned below,

1.      The supplier must be able to deliver a wide range of projects. The workers and technical staff must have some profound experience in designing access control systems (Hiles, Andrew, 2010).

2.      The supplier must be able to deliver innovative technology through modern digital learning processes. Specialized and skill capabilities should be reliable for the contract.

3.      The service cost and designing cost should be limited and the agreement with the supplier should be cost effective (Corpcomputerservices.com, 2017).

4.      The external agency should be reputed and managed to provide a quick response to the queries and services. The schedule of delivery and order must be followed in any hard and fast conditions. The supplier should be able to deliver the services in the minimum time possible (Claver, González, Gascó, & Llopis, 2002).

5.      The focus of the supplier should be on the high-performance business, by outsourcing the design of VR Reader, SME company should be able to maintain the strategy and production of VR Reader should be beautiful, effective and remarkable (Baldwin, Irani, & Love, 2001).

6.      Integrate additional parts information are related knowledge on every portion, it needs to include the system with medical info or textual. Thus, if the dealers was moving or facing the portion of the VR reader than must have to get knowledge about this. Thus, the suppliers can learn what exactly 611 the particular part is about. As the range of the knowledge by the information of Meta from various part of the machine used in it, while the limits for the particular part might be needed to the part of the tools, as it complete the requirement of MR 8 - MR 11. As it plan the principles cannot provide it in works almost the design principles of VR reader. Though, as it openly inquired through specialists in the workspaces or through the media psychology or the education.

7.      It is dissimilar link with the portion or sections machines that needs, it is the major part of system. While the VR reader scheme interact, as it is the prime part that enabling the dealers that they understand or learn. As there is the extraordinary courtesy nearly as it interact with the crucial system. As this principle design to contribute MR 3 to MR 6.

Typical suppliers to outsource design

The collaboration with other companies can extend the product quality and the convenience in the security system can be improved. Based on the new and optimized design as proposed in the present work SME company can outsource the design and information regarding manufacturing process with KANTECH system Inc. or GDX Door entry (Pacgdx. com, 2019). On the basis of typical criteria of selection for outsourcing the design the most suitable supplier is GDX that is a product brand of Stanley security products. Stanley Security products is also a part of Stanley, Black, and Decker Inc. GDX provides an extensive range of services for the access control system applications, solutions and variety of services as well (Doorentrydirect. com, 2019). Currently, GDX is dealing with 300 dealers and distributors on an international level. The company provides quality services, technical support, and customer services for the customers. The versatile solutions provided by GDX are scalable, suitable, and helpful for the application in different environments (Pacgdx. com, 2019). The installation of the integrated and web-based system provided by GDX increases the robust functionality, reliability, and meet the other specific and rigorous demands for the customers and for the commercial market sectors (Doorentrydirect. com, 2019).

The technical support team, GDX design, and manufacturing team are based in the UK that also provides services in Paisley, Scotland. SME Company can consult the services of GDX as the company is already providing services from the last 30 years in the designing and manufacturing of door entry and access control systems (Pacgdx. com, 2019). The company is listed in top companies for the delivery of services and in the market sector. GDX is offering services in partnership with local and international companies. The change in technology and the changing requirements can improve the functionality of the services and product. GDX is providing higher level functionality of access control products for the residential as well as commercial market sectors (Pacgdx. com, 2019). The functionality of the process is based on Elegance styling and flexibility in the services and applications of door entry control systems.

The focus of the companies to provide solutions, design wale ability maintenance and installation of an effective security system. SME Company can outsource the information about the design to get verified services and more benefits for the digital audio distribution and digital environment system applications (Doorentrydirect. com, 2019). GDX use a wide range of equipment that is extensively supplied by the authorized distributors, installers, and dealers. GDX ensures approved suppliers for the high levels of support provided to the customers. The designs for services by GDX include a full range of technical specifications, designs, and support (Doorentrydirect. com, 2019). On the basis of GDX company analysis and the services provided by the company, it can be concluded that SME company can outsource all the design information with GDX to develop new security products. The system functionality increases with changing the requirements, demands and associated legislation (Doorentrydirect. com, 2019; Pacgdx. com, 2019).

Criteria of selection for outsourcing of manufacturing process

There are different criteria to suggest the authentic outsourcing of information regarding the manufacturing processes. The manufacturing process is the typical problem that requires concerned with the experts for the accuracy of the project. In the present work, a specified selection criterion for the outsourcing of the manufacturing process is suggested for an SME company (Aubert, Patry, & Rivard, 2002). The most important criteria for the manufacturing process are a cost-effective process that must be considered for the scalable solution of the demand. The outsourcing of the information can be helpful for the building of space control system and the access control system (Learn kit. com, 2015).  

1.      The cost of the manufacturing process should be less, and the company must provide experts for the development processes and manufacturing processes of the security systems (Aron, Clemons, & Reddi, 2005). The workers of the company must be trained and should be capable of scalable solutions for the security systems and VR Readers. The services should be provided to SME company at the optimized level and without any additional cost (Aron, Clemons, & Reddi, 2005).

2.      The company should be able to provide leverages at best practices and new learning solutions should be stagnant. The perspective regarding the deep understanding of functionality and capability should be based upon the new technology and excellence of learning should be invested on VR readers for the manufacturing (Learnkit. com, 2015; Allan, 2002).

3.      The suppliers selected for the Outsourcing of the manufacturing process should have a depth of perfect experience. The instrumental designs and learning space should be able to provide products on a time with the highest of maximum accuracy. There are diverse projects and processes for the manufacturing of VR readers. The experience of suppliers can reduce potential challenges faced by diverse projects (Learnkit. com, 2015; Aron, Clemons, & Reddi, 2005).

Typical suppliers to outsource manufacturing process

SME company requires an authentic company for the Outsourcing process of manufacturing of VR reader.  On the basis of the selected criteria, there are different companies that are providing consultancy as well as services. KENTECH Consulting, Inc. Provides different kinds of security systems (Yuqio. com, 2018). The background of the company has an excellent match with the over requirements. The company provides experts that provide a diverse type of services. The workers of the company have multi industry experience, therefore, they can provide services as according to the requirements of SME company (Ekentech. com, 2019). KENTECH Consulting, Inc. Offers customized solutions, sophisticated tools, security checkup, and digital background for the development of innovative technology. The manufacturing outside process consists of hiring new people outside of the company or assemble them from another company to have a comparatively high advantage (Ekentech. com, 2019; Kentech. ie, 2018). The adorable process of outsourcing of manufacturing and production process of a company provide the comparative advantages in the area of production. The growth of VR Technology requires Technology experts and professionals in the security field. KENTECH Consulting, Inc. Considers offers as well as applications from China Japan Ukraine USA and UK for the consultancy in the practical work of security system development.  The main goal of the company is to provide advance future to the production process and enhance the technology aggressively (Ekentech. com, 2019). KENTECH Consulting, Inc. is an appropriate option for SME company to outsource the manufacturing process. The company met with the defined criteria and is listed in the top companies as provided on the internet (Ekentech. com, 2019; Baldwin, Irani, & Love, 2001).

Conclusion on Outsourcing Study of Product Design and Manufacturing Activities

Outsourcing is a technique to accelerate manufacturing as well as production design process. In the present work, there were main concerns including the development of the new or improved design for VR readers and then to identify the outsourcing company for design and for the manufacturing process. The production performance can be improved by considering different processes because SME company is facing challenges of capacity. The best solution to overcome the challenges is the outsourcing of design and manufacturing. A number of companies are providing basis control and access control system based on the credentials. SME is also providing an access-based control system. As the network technologies or the uses of computer, and it can’t delay for their development, as to grow or explore in sync by them. Vigorously approving fresh expertise not for the efficiency of the library work enhance, and also give the various VR reader services. So, the virtual reality of the technology is for the applications, as it is necessity that mix the technology of VR reader by the links in the museum to the actual situation of every library, as it also provide the best features services to the readers after using the VR reader technology.

Before hitting any company for outsourcing process, the selection criteria are proposed for outsourcing of the information. In order to facilitate the customer with accurate services of Access-based control, SME company can outsource design information of VR reader product with GDX that can perform new design implementation of security products. Similarly, on the basis of selection criteria of the company for outsourcing of manufacturing defined KENTECH Consulting, Inc. as an appropriate option to outsource the manufacturing process.


References of Outsourcing Study of Product Design and Manufacturing Activities

Aktas, E., & Ulengin, F. (2005). Outsourcing logistics activities in Turkey. The Journal of Enterprise Information management, 18(03), 316-329. Retrieved 11 21, 2017

Allan, A. (2002). Innovation Management: Strategies, Implementation, and Profits . Oxford University Press.

Aron, R., Clemons, E. K., & Reddi, S. (2005). Just Right Outsourcing: Understanding and Managing Risk. Proceedings of the 38th Hawaii International Conference on System Sciences, 1(1), 1-10. Retrieved 11 21, 2017

Aubert, B. A., Patry, M., & Rivard, S. (2002). Managing IT Outsourcing Risk : Lessons Learned. Information Systems Outsourcing, 1(1), 155-176. Retrieved 11 04, 2017

Baldwin, L., Irani, Z., & Love, P. (2001). Outsourcing information systems: drawing lessons from a Outsourcing information systems: drawing lessons from a. Operational Research Society, 10(1), 15-24. Retrieved 11 04, 2017

Claver, E., González, R., Gascó, J., & Llopis, J. (2002). Information systems outsourcing: reasons, reservations and success factors. Logistics Information Management, 15(04), 294-308. Retrieved 11 04, 2017

Corpcomputerservices.com. (2017). IT Outsourcing: The Reasons, Risks and Rewards. Retrieved 11 04, 2017, from www.corpcomputerservices.com: http://www.corpcomputerservices.com/articles/outsourcing-reasons

Doorentrydirect. com. (2019). GDX. Retrieved from doorentrydirect.com: https://doorentrydirect.com/gdx-door-entry-systems

Ekentech. com. (2019). ABOUT US . Retrieved from www.ekentech.com: https://www.ekentech.com/about-kentech-background-services

Hiles, Andrew. (2010). The Definitive Handbook of Business Continuity Management. John Wiley & Sons.

Innovation-management. org. (2018). Choosing an innovation model. Retrieved from innovation-management.org: https://innovation-management.org/innovation-model.html

Kentech. ie. (2018). MEET THE TEAM. Retrieved from www.kentech.ie: https://www.kentech.ie/meet-the-team/1/sarah-kent.html

Learnkit. com. (2015, 05 30). 6 Reasons Why You Should Outsource Elearning Development. Retrieved from learnkit.com: https://learnkit.com/2015/07/30/6-reasons-to-outsource-elearning/

Osha. gov. (2018). Process Safety Management Guidelines for Compliance. Retrieved from www.osha.gov: https://www.osha.gov/Publications/osha3133.html

Pacgdx. com. (2019). World Class Security Products. Retrieved from pacgdx.com: https://pacgdx.com/

Sdmmag. com. (2018). VANDERBILT READER RESISTS HACKING. Retrieved from www.sdmmag.com: https://www.sdmmag.com/articles/95665-vanderbilt-reader-resists-hacking

Userlike. com. (2014, 12 12). The Pro's and Con's of Outsourcing your Customer Support. Retrieved from www.userlike.com: https://www.userlike.com/en/blog/the-7-pros-and-cons-of-outsourcing-your-customer-support

Yuqio. com. (2018, 03 21). VIRTUAL REALITY AND OUTSOURCING. Retrieved from yuqio.com: http://yuqio.com/virtual-reality-and-outsourcing-3/

 

Our Top Online Essay Writers.

Discuss your homework for free! Start chat

Study Master

ONLINE

Study Master

1617 Orders Completed

Quality Assignments

ONLINE

Quality Assignments

0 Orders Completed

Accounting & Finance Master

ONLINE

Accounting & Finance Master

1197 Orders Completed