You are on page 1of 75

Responding to the call of change is not just important but a necessity.

Time is too important; a day in the past is just now a minute and could only
be a second in the future. Philippines is considered as one of the fast growing
economy on South-East Asia, where technology rapidly innovates. With
transforming and time-flying lifestyle, it is time that can never get back.
Technocart Corporation accepts the challenge of modernization; the team will
now introduce something that will coincide to the rapid changes in todays
world. Technocart wants supermarkets to return the gift of time to its
customer by reducing queuing time because faster grocery times means
more valuable time for them. Technocart Corporation will assure you that
every competing

product that will

offer will

always adjust and be

technologically advance for its clients.


The call to innovation is next door. The trending today could just be
easily wiped out by what tomorrow has to offer. Every business venture
should heed to the call or else, get left behind and evicted in the canvass of a
competitive business industry. It is the challenge of the new millennium, to
be at hand with the changing patterns of economy, business and technology.
Change is the only thing the remains constant. It is the only way to go.
In light of the foregoing, Technocart Corporation would like to enter the
market with the most efficient, sophisticated, and innovative product. The
Corporation,

in

its

zeal

to

promote

efficiency in

the

operations

of

supermarkets and convenience in the shopping experience of mankind


presents you this breakthrough invention, the E-Cart: ASSET (Automated Self
Service Efficient Trolley).
E-Cart: ASSET will provide the shoppers with the most elite shopping
experience considering not just the queuing time reduced but some benefits
only E-Cart: ASSET can provide. The benefits include but not limited to
minimization of human error, cost efficiency on the part of the mall owners,
budgeting and aid to inventory management.

TECHNICAL ASPECT | 50

Through this, E-Cart: ASSET results to an innovative pushcart intended


to maximize the efficiency of grocery shopping through time saving on the
part of the shoppers and technological advantage on the part of the
supermarkets. The E-Cart: ASSET uses an RFID technology which eliminates
the traditional barcode scanning of products that are subject to human error
and computer failure. With the RFID technology, each product that is put
inside the cart would be automatically scanned and its accumulated price
would be shown instantly on the monitor installed in it. Through the E-Cart:
ASSET, shoppers can save time by reducing queuing time to counters that
scans every product using the barcode technology.

DEFINING RADIO FREQUENCY IDENTIFICATION (RFID)

RFID Reader

RFID Sticker
TA_Illustration#1: RFID Sticker and RFID Reader
Consumers shopping at retail electronics stores currently have limited
access to information. The overall shopping experience for an electronic store
can be improved by a Radio Frequency Identification (RFID) implemented to a
shopping cart. Radio frequency identification, or RFID, is a generic term for
technologies that use radio waves to automatically identify people or objects.
An RFID system consists of a tag, which is made up of a microchip with an
antenna, and an interrogator or reader with an antenna. The reader sends out
electromagnetic waves. The tag antenna is tuned to receive these waves.

TECHNICAL ASPECT | 51

An RFID implemented shopping cart will be able to sense when a


product is placed into the cart. It also displays the product information on a
LCD touch screen monitor mounted on the cart. A small embedded computer
will be used to retrieve product information from a central server.
RFID powered electronic shopping cart provides users with access to
be able to view product features, specifications, combination deals, and
reviews of the product from other users.
DEFINING E-CART: ASSET and E-COUNTER
E-CART: ASSET
The Electronic-Cart: Automated Self Service Efficient Trolley is a type of
invention that will provide a shopping cart with RFID capability; which can
produce a RFID scanning within the shopping cart for detecting RFID tags
attached on the goods of a store.
E-Cart: ASSET has the following characteristics:
A frame made of materials capable of blocking electromagnetic
waves like metal plate, further comprising: an accommodating
space for RFID-tagged items and a plurality of wheels.
An RFID reader that is attached to the frame that detects RFID
tags on items.
A monitor that is responsible for displaying features like each
product prices and total prices
A rechargeable battery that is responsible for providing power to
the RFID reader and monitor.
A metallic tray under the cart where RFID tags fall after being
automatically lock out from items purchased.

TECHNICAL ASPECT | 52

Below are proposed structures of E-cart: ASSET

TA_Illustration#2: Back View of E-Cart: ASSET

TECHNICAL ASPECT | 53

TA_Illustration#3: Top View of E-Cart

TA_Illustration#4: Front View of E-Cart

TECHNICAL ASPECT | 54

TA_Illustration#5: Side View of E-Cart

TA_Illustration#6: Pile of E-Cart


E-COUNTER

TECHNICAL ASPECT | 55

The Electronic-Counter is a type of a normal counter with flat screen


monitor that is also equipped with RFID technology responsible for detecting
the items located in the E-cart: ASSET and basket.
E-Counter has the following characteristics:
A Light Emitting Diode (LED) customer display which is a flat
panel display that uses an array of light-emitting diodes that is
capable of displaying the total amount of items to be purchased.
Touch screen monitor that is used by the cashier and serves as
an input device. The screens are sensitive to pressure and
cashiers interact with the counter by touching words shown on

the screen.
A magnetic card reader which is a device used to read magnetic
stripe cards, such as credit cards. It is also a device used to scan

and electronically save printed business cards


A cash drawer which is used for the storage of cash.
A thermal receipt printer where receipts given to customers are
being printed.

Below are proposed structures of E-Counter

TECHNICAL ASPECT | 56

TA_Illustration#7: E-Counter and its parts

TECHNICAL ASPECT | 57

TA_Illustration#8: E-Counter Front View

TA_Illustration#9: E-Counter Lateral View


SIMULATION OF E-CART: ASSET PROCESS

TECHNICAL ASPECT | 58

TA_Illustration#10: Simulation Process

TECHNICAL ASPECT | 59

TA_Illustration#11: Scanning of items in the


E-Cart

TECHNICAL ASPECT | 60

TA_Illustration#12: Scanning of Basket

TA_Illustration#13: Detection of RFID tag

TECHNICAL ASPECT | 61

TA_Illustration#14: Detachment of RFID Stickers


The process begins when the shoppers pick up E-Cart: ASSET or
basket. Then, they now start picking up the grocery items under their bucket
list. Once they put the items they want to purchase into the cart, the monitor
already updates the balances of those items inside the cart. This becomes
realistic because each item has RFID sticker where the RFID scanner on the
cart receives its electromagnetic wave.
Once the shopper finalized the picking up process of their items, they
now direct themselves to the E-Counter. E-Counter automatically receives
electromagnetic waves on those items on the basket and pushcarts and
immediately shows the balance on the monitor and LED customer display.
This is also happen because E-Counter has also a built in RFID scanner. Upon
payment, RFID tags are automatically remove from items purchased and this
are reusable after being reprogrammed.

TECHNICAL ASPECT | 62

When customers buy a small quality of items, they can also use
traditional basket. Here they can pay in the same cashier lane with built in
basket scanner and automatically sum up the total amount of items
purchased. Then, the customer can now proceed in the bagging process.
FEATURES/ADVANTAGES OF E-CART: ASSET AND E-COUNTER
Budgeting on hand
One important feature of E-Cart: ASSET is budgeting. The shoppers
already know the total price of items in their cart before proceeding to Ecounter. The total price is shown in the monitor and automatically updates
upon putting or removing items in the cart.

TA_Illustration#15: Screen Display on E-Cart

TECHNICAL ASPECT | 63

TA_Illustration#16: Screen Display on Monitor


Advertisements
The supermarkets who already adapted E-cart: ASSET can have their
additional

income

through

advertisements.

They

can

make

internal

agreements with other entities like suppliers, merchants, manufacturers,


service provider, etc. to advertise their product that can be shown on the
monitor of E-cart: ASSET.

TA_Illustration#17: Screen Display on Monitor


Inventory Tracking
The management can monitor the inventory inside the supermarket
and on their warehouse.

Reduced Queuing Time

TECHNICAL ASPECT | 64

The process of shopping will be faster since the E-Cart: Asset will
automatically record the products, its prices and the total amount of
purchases. Hence, time consume in the counter will be lessen.

Reusable RFID sticker


RFID stickers used in RFID Technology are more efficiently and cost
effective than bar codes. This happens because they offer more features and
are reusable for a period of 10 yrs.

PRODUCT AND SERVICE OFFERINGS


Package Offerings
Packages
Basic Package

Regular Package

Premium Package

Description
1 Server Set-up
20 Carts Licenses
1 RFID Smart card
2 Server Set-up
50 Carts Licenses
1 RFID Smart card
2 Server Set-up
100Carts Licenses
1 RFID Smart card

Freebies
24/7 Call Support

24/7 Call Support


Data Back-up Management
24/7 Call Support
Data Back-up Management
1 year Quarterly
Maintenance

Additional Service
Services
E-Cart: ASSET Maintenance

Description
A process of keeping the product
updated with changes in the program
and determining whether they are

TECHNICAL ASPECT | 65

functioning properly.
Additional Products
Product

Description

Additional E-Cart: ASSET

Additional E-Cart: ASSETS order by the client with

Additional E-Counter

accordance to their needs


Additional E-Counter requested by the clients

TA_Illustration#18: Product Offerings

TECHNICAL ASPECT | 66

Production Process

TA_Illustration#19: Production Process

TECHNICAL ASPECT | 67

TA_Illustration#20: Distribution Channel

The transaction process begins with the receipt of a customer order by


the Field Sales Executive. Since a customer order may or may not be a

TECHNICAL ASPECT | 68

physical document or source document, the first task is to transcribe into a


formal sales order upon the approval of the Vice-President for Marketing and
Developer Relations. The sales order captures vital information such as
customer's name, address, quantities sold and unit price of items sold. After
the approval of the sales order, the Field Sales Executive provides three
copies. Field Sales Executive keeps the original copy and provides the other
two copies to Corporate Account and Budget Analyst and Logistic Coordinator.
The Corporate Account and Budget Analysts receive a copy for reference file
purposes while the Logistic Coordinator receives it to triggers a purchase
order.
Since the Technocart uses just-in-time systems, the raw materials are
to be delivered, exactly at the time they are needed to initiate a production.
The purchase order will be prepared by Logistic Coordinator and subject for
approval by the Vice-President for Finance and Vice-President for Productions
and Operations. The original copy of the approved purchase order is for the
Logistic Coordinator. In addition, two other copies are provided to Corporate
Account and Budget Analysts and Supplier. The Corporate Account and
Budget Analyst receive a copy to make memo entries for pending inventory
and associated obligation. While Supplier receives a copy to initiate the
delivery of the raw materials needed.
Upon the receipt of raw materials inventory, the Processing Equipment
Superintendent is responsible to checks quantity and quality of goods and for
the detection of shipped goods that contain damaged or incorrect items.
Then the Logistics Associate acknowledges the materials and tools. Logistic
Associate issues a receiving report to Logistic Coordinator. This issuance of
the receiving report will serves as reconciliation with purchase order. Logistic
Coordinator also issue receiving report with attached suppliers invoice to
Corporate Account and Budget Analyst to recognize liability and records the
corresponding increase in raw materials inventory.

TECHNICAL ASPECT | 69

The Logistic Coordinator then will issue a raw materials requisition.


Upon the approval of Vice-President for Productions and Operations of
materials requisition, two additional copies were provided to Corporate
Account and Budget Analyst and Logistics Associate. The Corporate Account
and Budget Analyst then will record the corresponding deduction in raw
materials inventory and addition to work-in-process inventory. The Logistics
Associate will validate the raw materials issued by the warehouse keeper on
the production. It's important to take note that the function of Warehouse
Keeper are for safekeeping and custody purposes only.
Finished goods done by the Assembler and Programmer (Software
Installation) to be inspected by the Processing Equipment Superintendent.
The Assembler and Programmer make two copies of finished goods report
provided to Corporate Account and Budget Analyst and Logistics Coordinator.
The Corporate Account and Budget Analyst will record the corresponding
increase in Finished Goods Inventory and reduction in Work-In-Process
Inventory. The warehouse keeper receives the finished goods and verified by
Logistic Associate.
The Logistic Coordinator issues a stock release report upon approval of
the Vice-President for Productions and Operations. Two additional copies are
provided to Corporate Account and Budget Analyst and Logistic Associate.
The Corporate Account and Budget Analyst will finally record the sales
transaction described in the completed sales invoice. On the other hand, the
logistic associate will inform warehouse keeper for releasing the ordered
product and delivery the products to the customer.

TECHNICAL ASPECT | 70

QUALITY CONTROL

TECHNICAL ASPECT | 71

TA_Illustration#21: Quality Control

Quality Control is a set of activities for ensuring the quality of the


products. The activities focus on identifying defects in the actual products
produced. Its goal is to identify defects after a product is developed and
before it is released, so that customer's requirements are continually met.
The Quality Control process of Technocart Corporation starts upon the
outsource

materials

needed

for

production

are

received.

When

the

outsourced materials are received by the warehouse, these will be inspected


before being used in the production. Inspection includes verification, quantity
and quality checking, sampling and testing. When materials are already
approved, it can now proceed to production process otherwise return to
suppliers.
Quality Control in the production process starts by conducting random
inspection everyday and performing inspection in every stage of production.
When the product is finished and placed in the warehouse, workers shall
conduct final inspection before delivery. Once inspection reports are approved
by the customer, the products are now ready to be delivered.

Physical,

systems and network installation are to be done on the supermarkets area


with inspection at each stage. Then, E-Cart: ASSET and E-counter are ready
for operations.
QUALITY ASSURANCE
Aside from the above quality control on the product it produces,
Technocart Corporation also applies some policies and procedures to assure
the quality of the business transactions. The quality assurance program is
intended to ensure the accuracy, completeness, timeliness and comparability.

TECHNICAL ASPECT | 72

Representatives are known and well documented. It is also designed to


control and monitor the data related to the product development.
One of the primary aspects of the Quality Assurance program of the
corporation is the management involvement. The production process are
implemented and inspected by a supervisor, that will identify the strategy
and controls currently employed, or to be developed and implemented by the
workers, to consistently deliver products and services that will meet the
requirements of customers and stakeholders.
The quality assurance program will serve as a map of the current
controls employed corporation, and will present a good strategy for the
continuing development in the industry. The following are sets Quality
Assurance Program of the corporation:
The corporation will require that closure activities be appropriately
planned in accordance with the provisions of the quality assurance and
that when activities deviate from planned outcomes and indicate
significant conditions adverse to quality, personnel are required to stop
the activity until corrections can be made.
All personnel must be responsible for performing

activities in

accordance with approved documents; identifying and participating in


quality improvements, customer and supplier interface, and processes
with which they are associated.
The supervisor is responsible for exercising stop work authority over
significant conditions adverse to quality, and for attending training.
Management is responsible for providing any additional skills and
training prior to assigning employees specific project duties. Typical
training methods include computer-based training and on-the-job
training.

MATERIALS

TECHNICAL ASPECT | 73

Product
Push Cart
Tablet(monitor)

RFID Sticker

Charger of Battery

Battery Modules

Load balancer TP
link

Specification

ALLWINNER A31S QUAD CORE A7 1.6GHz


ANDROID 4.2 JELLYBEAN
8 GB
7 Inch
Mechanical Specification
Substrate - PET
Liner - Glassine Liner
Weight - 1g / pc
Reel core inner diameter - 76 mm / 3
Tag Dimension - 48 x 14 mm / 1.89 x 0.55
User Memory 512 bits
Read range - Up to 3 m / 9.84 ft
Model Number - CHEUF
Battery Sizes Charged - 9V, AA, AAA, C, D
Dimensions - 180 x 130 x 65mm
Capacity - 200mAh
Dimensions 48.4 x 26.2 x 17.4mm
Nominal Voltage - 8.4V
Size 9V
Dimensions (W X D X H)
11.6*7.1*1.7in. (294*180*44mm)
13-inch Standard Rack-Mount Width
1U Height

Cost
P3,200
P4,190

P 6.75

P1,783.98
P292.74

P4,850

Power Supply
Internal Universal Power Supply
AC100-240V~50/60Hz input

Weather Proof UTP


Cable

Rj45 connector

DRAM - 64MB
Flash - 4MB
Cable Construction
UTP
0.57mm (0.023 in.) (23 AWG) solid bare copper
6.35mm (0.25 in.) max jacket diameter
UTP FTP modular plug, cat5e RJ45 Connector
Crystal head Product Description Key
Specifications/Special Features: -RJ45 plug,
unshielded/shielded solid/stranded 8P8C -

P2,375

P5.00

TECHNICAL ASPECT | 74

RFID writer

HP DL380

Network Attached
Storage

Uninterruptible
Power Supply (UPS)

Rack

HP ML150 G5
(Tower Server)

RF Module

Processor : Quad core1.6GHz


OS: Android4.2
Flash: 4GB
TF card: 32GB max
Processor - family Intel - Xeon - 5600 series
Processor Installed - Intel- Xeon- E5620 (2.4GHz)
Number of processors Installed 1Memory
Maximum memory - 384 GB
Capacity - 6 x 2TB SATA LFF HDDs
Drive Description - SFF/LFF SAS/SATA
Processor- Intel Xeon E5520 (2.26GHz)
Standard
Processor Cache - 8 MB L3
Memory - 6 GB DDR3 Registered (RDIMM) with
ECC
Storage Controller - Smart Array P212/512MB
BBWC
Dimensions (HxWxD) - 8.75 x 44.80 x 69.88 cm
Weight - 19.22 Kg
Output Power Capacity - 3500 Watts / 5000 VA
Max Configurable Power - 3500 Watts / 5000 VA
Output Voltage Note - Configurable for 220 : 230
or 240 nominal output voltage
Size: Width x Depth= 600x1000
Model no: ACS-CC-06A-426100
Material: steel iron
Quad Core Intel Xeon 2.33Ghz
2GB DDR2
Up to 8 Hot-Plug LFF SAS 15K 300/146/72/36 GB
Up to 8 Hot Plug LFF SATA 7.2K 750/500/250/160
GB
Up to 4 Non-hot plug LFF SAS 15K 300/146/72/36
GB
Up to 4 Non-hot plug LFF SATA 7.2K 500/250/160
GB
HP 72GB 15K SAS 3.5 Hot Plug Hard Drive x 1
Frequency 403.00MHz ~ 468.00MHz
Distance 1.9KM Outdoor space
Voltage DC 3.0V ~ 8.0V
Receiving Current 24mA
Transmit Current < 96mA

P 13,500

P 210,000

P526,330

P 251,403

P999

P91,995

P5,560

TECHNICAL ASPECT | 75

GP90A Long Range


Proximity Reader

RFID Tags

RFID Scanner

Sensitivity 19200bps -108dBm


Contactless reading.
Reading distance up to 90 cm
Externally programmable interface
Potted for environmental protection
Weather resistant
User convenience
Easy to install
Unique design
Relay control
Firmware download model
Status LED display
Tuning LED display
Thick Proximity Card
- Read Range : 15~ 25 cm
- Printed Material can be pasted on the front card
- 8 digit card number printed at the back of the
card
- EA-20 RW , EA-25RW ( read/write) chip
AM Card Interface
Standard: ISO 7816
Protocol: T=0 protocol
Operating frequency: 4 MHz
Smartcard read/write speed: 9600 - 115200 bps

P2,480

P60

P2,340

Physical Specifications
Connection method: Serial RS232 interface
Power Source: USB interface
Speed: 9.6 kbps, 115.2 kbps
Supply voltage: Regulated 5 V DC
Supply current: 200 mA <maximum); 50 mA
(standby); 100 mA (normal)
Dimensions: 120.5 mm (L) x 72.0 mm (W) x 20.4
mm (H)
Colour: Metallic blue
Operating distance: Up to 50 mm (depending on
tag type)
User controllable bi-colour LED: red and green
Buzzer: monotone
Temperature: 0-50 C

TECHNICAL ASPECT | 76

Humidity: 10%-80%
Cable connector length: 1.5 m (DB9 + USB)
E-Counter Set:
Led Customer
Display
Touch screen
Monitor
Magnetic Card
Reader
Cash Drawer
Thermal Kitchen
Printer

P 55,000
CPU: Intel Atom Single core D425 1.8G
Memory: 2G DDRS(up to 4G)
Hard Disk: 500 HDD
Graphic Card: Integrated Intel GMA
3150 graphics core
LAN Network: Integrated network card
Power: 100-240V input 1U server low-noise
power
Display: 15 A+ grade high-brightness industrial
TFT LED panel with resistive touch screen,
1024*768 32-bit
Resolution: 1024(H) x 768(V) XGA
Thermal Kitchen Printer: 80mm Cable kitchen
printer
Thermal Receipt Paper: 57mm*50mm or
80mm*50mm

SUPPLIERS
Metal System Incorporated

Location
92 4th Street 7th Avenue 1400 Caloocan City,
Philippines

Enigma Technologies

CMS Building Mezzanine 339, Mc Arthur Highway,


Brgy. Ninoy Aquino, Angeles City, Pampanga,
Philippines

Laxcen Inc. Ltd

Zhejiang, China (Mainland), Ningbo China

TECHNICAL ASPECT | 77

Energizer

Unit 2304 - 2310, Hanston Square, San Miguel


Avenue, Ortigas Centre, San Antonio Ortigas
Center, Pasig 1605 Metro Manila, Philippines

RS Components Corporation

21/F Multinational Bancorporation Centre


6805 Ayala Avenue, Makati City, Philippines

PC Express

2nd flr. Diane Building, Rizal Avenue Extension,


Caloocan City, Philippines

Enigma Technologies

CMS Building Mezzanine 339, Mc Arthur Highway,


Brgy. Ninoy Aquino, Angeles City, Pampanga,
Philippines
Unit LG30, City land Dela Rosa Condominium,
Makati City, Philippines

FCC I.T. Services

Digital CCTV & Electronics

123 10th Avenue Cubao Quezon City Metro


Manila

TA_Illustration#23: List of Suppliers


LIST OF SUPPLIERS

TA_Illustration#23: List of Suppliers


TOOLS AND INDIRECT MATERIALS

Product
General purpose tool
set
Electrical Tape
Screw
Wire

Supplier

Price

Ace Hardware (SM


Pampanga)

P 3,225.00

Local Hardware

P 30 per roll

Local Hardware
Local Hardware

P .50 per piece


P 800 per roll

TECHNICAL ASPECT | 78

Soldering Iron

Local Hardware

P 150

TA_Illustration#24: List of Indirect Materials

TECHNICAL ASPECT | 79

SOFTWARE LICENSING
A software licensing is usually an agreement that grants a right to use
software code to someone else. A license usually grants fewer rights than a
sale of a copy of the software. The rights to use the code are defined by the
terms of the license.
Why Are Software Licenses Important?
A part of Technocart Corporations product is to make code available to
supermarkets in order for the applications of E-Cart: ASSE. Supermarkets may
wish to acquire rights in software that can make their products works in new
ways or in ways compatible with their existing computer systems.
How Does A Software License Agreement Work?
The author, of the software code frequently owns the code. In cases
where the developer of the software is an employee of a company, the
company is usually the author (Technocart Corporation). The owner of the
code controls who gets to use the code and how the code is used. The
software

license

may

define

who

can

use

the

code

and

in

what

circumstances.
Most software licenses are "proprietary" licenses, meaning the
software publisher grants a license to use one or more copies of software, but
that ownership of those copies remains with the software publisher. The user
must accept the license before they are permitted to use the software.
Standardized "End User License Agreements" (EULAs) are common for
most consumer and commercial mass produced software. When someone
purchases software, the owner of the software typically requires the user to
agree to license terms by clicking to indicate agreement to a set of terms that
is required before the software can be installed or operated on a computer.

TECHNICAL ASPECT | 80

The user is not really purchasing the software, but is licensing the software.
When specialized or customized software is involved, the license is often a
signed written agreement that includes terms that are customized to fit the
needs of the parties to the license agreement.
The licensing subscription will last in accordance with the contract
agreed upon. Once the subscription expires, the client can either subscribe
again or not. Since, technology is fast growing if the supermarket chooses to
subscribe again, the corporation will be the one who is responsible for the
updates and maintenance of the software. Then, if the supermarket chooses
not to subscribe, they can still use of the software but they should provide
their own software updates and maintenance.
PROGRAM
1. Simulation of Business Process
The process begins when the traditional shoppers picks up push carts
or baskets that are placed in a certain area of the business. There are times
where some shoppers find it convenient not to use these items especially if
they dont have much items to purchase.
With the use of push carts or baskets, they now then start picking up
the grocery items under their bucket list. They wander around the area of the
supermarkets to search for the items they want to purchase. Shoppers who
find difficulty in searching for their items usually seek customer assistance.
Shoppers first check the information about the item before they decide to put
it inside the push cart or basket. These information contains but not limited to
price, unit if measure (e.g. kilograms), and nature of the item.
Once they finalized the picking process of their items, they now direct
themselves to the cashier lanes. In certain instances, some shoppers go back
with the picking process when they realize that they forget certain items to

TECHNICAL ASPECT | 81

purchase or when they know that some items are mismatched with the
products under their bucket list. Meanwhile, the shoppers in the lane wait
until

the

current

shoppers

finished

the

payment

process

to

the

accommodating cashier personnel. In average, it takes 8.92 minutes of


queuing time before the current shopper finished the payment preceded by
the time consuming individual scanning of products which is the real reason
behind the much time spent. The most challenging situation regarding the
scanning of bar codes of each individual product is that sometimes, some bar
codes are not recognized quickly for some technical reasons. The same
procedure is undertaken by the next in line shoppers.
The shopping experience of the shopper does not stop with the product
bar code scanning and payment. It is followed by the bagging of the items to
plastics or boxes, depending upon the number of the items purchased.
Bagging is done by personnel awaiting the payment process. Some baggers
accommodate the shoppers up to the point where they bring their purchased
items to their cars or awaiting transportation vehicles. This is common for
high end shoppers who want special treatment as one supermarket manager
quoted, Shoppers are delighted when they are pampered by supermarkets
(Interview with Ms. Maricel of Robinsons Supermarket, July 2, 2015)

2. Review of Current data


A supermarket currently implements Point of Sale (POS) system. POS is
an inventory software programs that let track usage, monitor changes in unit
costs, calculate when need to reorder, and analyze inventory levels on an
item-by-item basis. It can even control inventory at the cash register with
point-of-sale (POS) software systems. POS software records each sale when it
happens, so inventory records are always up-to-date. Better still, It will get
more information about the sale than could gather with a manual system. By
running reports based on this information, one can make better decisions
about ordering and merchandising.

TECHNICAL ASPECT | 82

Features to consider in a POS system include the following:

Ease of use. Look for software with a user-friendly graphical interface.

Entry of sales information. Most systems allow entering inventory


codes either manually or automatically via a bar-code scanner. Once
the inventory code is entered, the systems call up the standard or
sales price, compute the price at multiple quantities and provide a
running total. Many systems make it easy to enter sales manually
when needed by letting search for inventory codes based on a partial
merchandise number, description, manufacturing code or vendor.

Pricing. POS systems generally offer a variety of ways to keep track of


pricing, including add-on amounts, percentage of cost, margin
percentage and custom formulas. For example, if provide volume

discounts, It can set up multiple prices for each item.


Updating product information. Once a sale is entered, these systems
automatically update inventory and accounts receivable records.

Sales tracking options. Different businesses get paid in different ways.


For example, repair or service shops often keep invoices open until the
work is completed, so need a system that allows putting sales on hold.
If selling expensive goods and allowing installment purchases, it might
appreciate a loan calculator that tabulates monthly payments. And if
offering rent-to-own items, it will want a system that can handle
rentals as well as sales.

Security. In retail, it's important to keep tight control over cash receipts
to prevent theft. Most of these systems provide audit trails to trace any
problems.

Taxes. Many POS systems can support numerous taxes rates-useful if


one run a mail order business and need to deal with taxes for more
than one state.

TECHNICAL ASPECT | 83

POS Systems
When a shopper approaches a cashier to complete a transaction, the
cashier will likely employ a computer or cash register to collect some basic
information. According to Yahoo! Small Business, POS systems either require
cashier to manually enter information about the purchased items using a
keyboard or use a bar code scanner to automatically register product
information. The computer system then retrieves the item price and a basic
description from a database, and some systems automatically deduct the
item from the retailer's inventory. When the cashier indicates that she has
registered all of the items in the transaction, the POS system calculates a
subtotal, applies any applicable taxes and presents a total amount due.
Payment Processing
If the shopper pays cash, the cashier typically registers the total
payment with the computer, accepts the currency and returns the difference
between the tendered amount and the amount due in the form of change. If a
shopper offers a personal check, the cashier may either accept the check as
a substitute for cash and manually deposit to the supermarket's bank account
later or, if so equipped, submit the check to the POS system's check
processing feature. If the point of sale system features checks processing, the
system will read the shopper's bank routing and account numbers from
magnetic ink on the check then submit that information along with the
transaction total to the Automated Clearing House network for settlement.
According to the financial software company Intuit, the ACH network
electronically debits or verifies the customer's checking account and begins
the process of transferring money from the customer's account to the
merchant's account.
Credit Card Processing

TECHNICAL ASPECT | 84

If the shopper offers a credit or debit card as payment, the cashier will
likely begin the transaction process by swiping the card through a magnetic
reader attached to the POS system. According to the merchant account
website Info, the point of sale system then bundles information from the
customer's card with other transaction, like the amount, and sends it to the
appropriate credit card network for processing. The network uses the card
number to route the transaction to the shopper's bank, and the bank issues
an authorization or decline message for the transaction. The network then
returns the response, and the point of sale system displays the corresponding
message.
3. Data Mapping

TECHNICAL ASPECT | 85

TA_Illustration#25: Data Mapping

Data mapping is a process used in data warehousing in which different


data models are linked to each other by using a defined set of methods to
characterize the data in a specific definition. This definition can be any
atomic unit, such as a unit of metadata or any other semantic. This data
linking follows a set of standards, which depends on the domain value of the
data model used. Data mapping serves as the initial step in data integration.

TECHNICAL ASPECT | 86

Basic Mapping Concepts


Mapping features a number of terms such as source, target, forward,
and reverse or backward maps (e.g., General Equivalence Mappings). In order
to know mapping, it is important to understand these terms. The source is the
origin of the map or the data set from which one is mapping. The target is the
data set in which one is attempting to find equivalence or define the
relationship. Like other types of maps, here is a starting place and a final
destination for each data item linked in the process.
Technocart Corporation provided four parts of data mapping which
includes main group, category (with sub-category), branding and items. Main
group pertains to different types of items that can be found in the
supermarket like hygiene, foods, appliances and many more. Category refers
to the class or division of items regarded as having particular shared
characteristics. For example, under hygiene we have soap, shampoo, and
toothpaste .Branding involved the process of creating unique name and
image of the products. For example under shampoo are Palmolive, Dove,
Sunsilk and Pantene. Lastly, the items refer to the distinct characteristics of a
certain product like its color, size and design.

TECHNICAL ASPECT | 87

TECHNICAL ASPECT | 88

TECHNICAL ASPECT | 89

TA_Illustration#26: Data Mapping Interfaces

TECHNICAL ASPECT | 90

Programming
Staging
The grocery items and goods are equipped with RFID tags. When the
shopper puts any product in the cart then the sticker is read by the RFID
reader. The RFID reader will detect items within certain range particularly as
wide as the shopping cart. Items on the shelves would not be detected. The
information of the product is extracted and displayed on the monitor attached
in the cart. When a shopper is indecisive to purchase or not to purchase a
certain grocery item, accordingly with the aid of the RFID reader it will
immediately detect an item that is place or remove inside the cart. In
addition, a receipt is temporarily prepared on the system through the aid of
Radio Frequency Module. A program will automatically increase/decrease the
corresponding amount and quantity.
Billing/Finalize
The RFID reader on the counter can verify the purchase of the items as
they are placed in the cart and communicate with a billing system to
automatically bill the shopper for the purchases. A finalize receipt will be
issued upon payment. Since a receipt is temporarily prepared on staging, for
reconciliation

purposes,

it

is

compared

with

the

finalize

receipt.

Correspondingly, a program would automatically record the transaction,


grocery items that had been purchased and paid, would deduct its
corresponding inventory and would add its corresponding sales and transmit
the data through the server.
Sales Return
Once a damaged or defective grocery items are returned by consumer
upon

verifying

the

receipt,

program

will

automatically

clear

the

corresponding transaction and sales transaction will rendered as void. Also


side by side, the billing information on the stated receipt will also be updated
in the database. Inventory and sales status of the product is also updated.

TECHNICAL ASPECT | 91

Work Flow

Defined as a collection of tasks organized to accomplish some business


process.

Example of Work Flow


When a warehouse transfer goods to the supermarket, both of them
should update their inventories. If the goods transferred are sold,
supermarkets will deduct it to their inventories and record it to sales.
Then, supermarkets will automatically send the information about their
sales to the server of the Technocart.
When the level of inventory of a specific grocery items displayed in instore shelves is less than the safety stock it automatically alerts the
warehouse so that certain inventory is subject to replenishment. The
standard number of safety stock may depend upon the supermarket;
replenishment processing enables to maintain the inventory stocking
level.

In work flow, there is what we called Time-Based Work Flow. TimeBased Work Flow customs functions that will be scheduled and
triggered based on a specified time.

Example: In E-Cart: Asset, there is a monitor that shows advertisement of a


product. Before changing every advertisement, there is designated time for
how long will it lasts on the screen.

Programming Language
Programming Language usually refers to high level languages such as
PHP, VB, Java, and ASP. Each language has a unique set of keywords and a
special syntax for organizing program instructions. These languages will be
used to implement E-Cart: ASSET.

TECHNICAL ASPECT | 92

PHP (Personal Home Page) offers web developers a large selection of

instruments. It has become the basis for many web applications.


VB (Visual Basic) is a programming environment from Microsoft in
which a programmer uses a graphical user interface to choose and
modify preselected sections of code written in the Basic programming

language.
Java a programming language designed especially for use in

distributed applications on corporate networks and the Internet.


ASP (Active Server Pages) it is use to gather data from the user and
display it at another time.

Scripting Language
A high-level

programming

language that

is interpreted by

another

program at runtime rather than compiled by the computer's processor as


other programming languages commonly are used to add functionality, such
as

different

menu

styles

or

graphic

displays

or

to

serve dynamic advertisements.


Scripting language is a back-end database that is accessed by users
indirectly through an external application rather than by application
programming stored within the database itself or by low level manipulation of
the data.
The following scripting languages will be used by the Technocart Corporation:

Structured Query Language (SQL)


SQL is used to communicate with a database; it is the standard

language for relational database management systems. SQL statements are


used to perform tasks such as update data on a database, or retrieve data
from a database. The standard SQL commands such as "Select", "Insert",

TECHNICAL ASPECT | 93

"Update", "Delete", "Create", and "Drop" can be used to accomplish almost


everything that one needs to do with a database.

Procedural Language/Structured Query Language (PL/SQL)

PL/SQL is an implementation of a structured query language (SQL)


programming language extension. PL/SQL is a powerful tool that combines
SQLs querying ability with the added bonus of programming features. By
adding procedural

constructs

to

overloading, information hiding,

SQL,

such

as encapsulation,

function

block structure, conditional statements,

loops statements, variable types, structured data and customized error


handling, the PL/SQL language takes on characteristics of object-oriented
programming languages.
types are

similar

to

PL/SQL's

language syntax,

the Ada programming

structure

language.

and data

Integrated

with

a database server, PL/SQL does not exist as a standalone language. Its


typically used to write data-centric programs to manipulate data in an Oracle
database.

Transact /Structured Query Language (T-SQL)


T-SQL (Transact-SQL) is a set of programming extensions from Sybase

and Microsoft that add several features to the Structured Query Language
(SQL) including transaction control, exception and error handling, row
processing, and declared variables. Microsoft's Server and Sybase's SQL
server support T-SQL statements. T-SQL is critical to SQL Server because each
SQL Server database action actually sends the database a series of T-SQL
statements. Performed actions are first translated into T-SQL statements,
even

when

using

the

graphical

interface.

4. Data Migration
Data migration is the process of transferring data between data
storage systems, data formats or computer systems. It is a key element to

TECHNICAL ASPECT | 94

consider when adopting any new system, either new purchase or new
development. A data migration project is usually undertaken to replace or
upgrade servers or storage equipment, for a website consolidation, to
conduct server maintenance or to relocate a data center. Factors to consider
in a data migration project include how long the migration will take; the
amount of downtime required; and the risk to the business from technical
compatibility issues, data corruption, application performance issues, and
missed data or data loss.
Data migration is necessary because of the use of a new computing system
or database management system that is incompatible with the current or
existing system. Examples of data to be migrated are inventories, price lists,
suppliers and customers information.
Factors to consider in migrating legacy data:

Bringing data over to new system


Bringing all or just parts of data
Bringing data on or after a certain date; last 3 months, last 6 months,

last year, or all data.


Filtering in or out specific data
Extractable desired criteria from the existing database
Importable desired fields of data into the new system
Inclusion of data migration process in purchasing new system
If not included, hiring someone or assigning expert in-house staff to
migrate data.

Once the decision is made to perform data migration and before migration
can begin the following analyses must be performed:

Analyze and define source structure (structure of data in the legacy

system)
Analyze and define target structure (structure of data in the new

system)
Perform field mapping (mapping between the source and target
structure with data cleansing, if necessary)

TECHNICAL ASPECT | 95

Define the migration process (automated vs. manual)


Once the analysis and mapping steps are completed, the process of
importing the data into the new system must be defined. This process may
be a combination of automation and manual processes or may be completely
automated or may be completely manual.

Create data extractions from the legacy system

Cleanse the data extractions according to mapping guidelines


Import the data extractions into the new system using that system's

import feature
Verify and test samplings of the data in the new system by comparing
data reports to the old system.

TECHNICAL ASPECT | 96

5. Testing (Users Acceptance Testing)

TECHNICAL ASPECT | 97
TA_Illustration#27: User Acceptance
Testing

TA_Illustration#28: CashierTECHNICAL
Processing

ASPECT | 98

Users acceptance testing is where the newly develop system


undergoes test of controls. It is one of the final and critical software project
procedures that may occur before newly develop software is rolled out to the
market. Usually, these tests were done by the intended audience or a
business representative. Testing presupposes there are defects in the
software waiting to be discovered and view is rarely disproved or even
disputed. This process applied gradually on the certain volume of carts.
Initially, the items that are subject to attachment of RFID stickers are
prepared. Upon the attachment, the RFID writer will program the blank
stickers for identification of each and specified item. The items that are
equipped with RFID stickers are transferred from warehouse to in-store. The
normal shopping process will initiate by scanning any items that are put
inside the cart. The scanning system should deduct any items that are
removed inside the cart. If the scanner fails to do its initial function,
programmer should follow the given scenarios. First, check the scanner if it is
on good condition and function. When the failure is not on the scanner, the
programmer should proceed in checking the system on inventory module, if
not then reinstall the scanner. When the reinstalled scanner works, scan the
items again but if it still not functioning, then it should be replaced with
another scanner. Second, if the inventory module operates well proceed in
checking the receipt module. If not reprogram the inventory modules until it
operates well, then scan the items again. Lastly, staging receipt module is
the last resort on finding the failure. Programmer must check the data in the
database server and fix it then rescan items in the cart. When testing of
shopping process gets approval, the testing should proceed to billing process.
Print the receipt upon payment. Validate the item on hand and compare it
with the printed receipt, if fails, examine the receipt module and reprint the
receipt. Then, check the prices on receipt and compare it with the data on the
system, if fails, examine the pricing module and print the receipt again.
Lastly, check if the number of items in in-store inventory is decreases, if fails,
examine the in-store inventory module and reprint the receipt. If the testing

TECHNICAL ASPECT | 99

on each phase is successful, process are just repeated and tested in a larger
number of items, then to the every product of the supermarket. If failure
occurred again, rerun the scenarios in each phase of testing.

SERVER DESIGN (TOWER SERVER)


1. Specification, Requirements, System set-up and Installation
Database and Web server
Database server may refer to both hardware and software used to run
a database. As software, a database server is the back-end portion of a
database application, following the traditional client-server model. This backend portion is sometimes called the instance. It may also refer to the physical
computer used to host the database. The database server is typically a
dedicated higher-end computer that hosts the database.
It is independent of the web server which is the computing model in
which the server hosts, delivers and manages most of the resources and
services to be consumed by the client. This type of web server has one or
more client computers connected to a central server over a network or
Internet connection. This system shares computing resources. It is a program
that uses HTTP (Hypertext Transfer Protocol) to serve the files that form Web
pages to users, in response to their requests, which are forwarded by their
computers' HTTP clients. Dedicated computers and appliances may be
referred to as Web servers as well. The process is an example of the
client/server model. These web servers can be accommodated on database
servers.
In the client-server computing model, there is a dedicated host to run
and serve up the resources, typically one or more software applications.
There are also several clients who can connect to the server and use the
resources offered and hosted by this server.

TECHNICAL ASPECT | 100

When considering databases in the client-server model, the database


server may be the back-end of the database application, or it may be the
hardware computer that hosts the instance. Sometimes, it may even refer to
the combination of both hardware and software.
In smaller and mid-sized setups, the hardware database server will also
typically host the server part of the software application that uses the
database. If consider a supermarket, for instance, the hardware database
server will host the software database server and the supermarket's software
application. This application will likely connect to the database via specific
ports and use inter-process communication to log into and access the data
suppliers in the database. The users in the supermarket, seated at their
personal computers, will also use the client module of the application
installed on their computers to connect to the database. In this example,
there are actually two client-server models we are looking at: the database
and the application.
In larger setups, the volume of transactions may be such that one
computer will be unable to handle the load. In this case, the database
software will reside on a dedicated computer, and the application on another.
In this scenario, there is a dedicated database server, which is the
combination of the hardware and software, and a separate dedicated
application server.
Product
Database Server
MS - SQL 2008 r2

Specification

Supports
stored
procedures,
triggers, functions, and views

Store all kinds of business data with


native support for relational data,
XML, FILESTREAM and spatial data

Improved performance, usability,


visualization,
in
addition
to
integration with the Microsoft 2007
Office System in SQL Server

TECHNICAL ASPECT | 101

Reporting Services

Web Server
Internet Information
Service (IIS)

Simplify development efforts by


leveraging existing T-SQL skills,
ADO.NET Entity Framework and LINQ

Closely integrated with Visual Studio


and Visual Web Developer

Provide information to users on the Internet.

Let users download and upload content with


FTP or World Wide Web Distributed
Versioning and Authoring (WebDAV).

Host Web services that contain business logic


for three-tier applications.

Distribute applications to users over the


Internet instead of through physical media,
such as floppy disks or CDs.

TA_Illustration#29: Database Server

TECHNICAL ASPECT | 102

TA_Illustration#30: Design of Server

TA_Illustration#31: Data Center

TECHNICAL ASPECT | 103

TA_Illustration#32: Data Center (Top


2. Fail over cluster set-up

View)

A failover cluster is a group of independent computers that work


together to increase the availability of applications and services. The
clustered servers (called nodes) are connected by physical cables and by
software. If one of the cluster nodes fails, another node begins to provide
service (a process known as failover). Users experience a minimum of
disruptions in service.

Failover is a backup operational mode in which the functions of a


system component (such as a processor, server, network, or database, for
example) are assumed by secondary system components when the primary
component becomes unavailable through either failure or scheduled down
time.
Servers in a failover cluster can function in a variety of roles, including
the roles of file server, print server, mail server, or database server, and they
can provide high availability for a variety of other services and applications.
This guide describes how to configure a two-node file server cluster. A
failover cluster usually includes a storage unit that is physically connected to
all the servers in the cluster, although any given volume in the storage is only
accessed by one server at a time. The following diagram shows a two-node
failover cluster connected to a storage unit. Storage volumes or logical unit
numbers (LUNs) exposed to the nodes in a cluster must not be exposed to
other servers, including servers in another cluster.

Note that for the maximum availability of any server, it is important to


follow

best

practices

for server

managementfor

example,

carefully

TECHNICAL ASPECT | 104

managing the physical environment of the servers, testing software changes


before fully implementing them, and carefully keeping track of software
updates and configuration changes on all clustered servers.
The interfaces for viewing or configuring shared folders in a failover
cluster have been extended and streamlined. The following list describes
functionality that is integrated into failover clustering:
Display is scoped to clustered shared folders only (no mixing

with non-clustered shared folders): When a user views shared


folders by specifying the path of a clustered file server, the display will
include only the shared folders that are part of the cluster. It will
exclude non-clustered shared folders that happen to be on a node of
the cluster.
Access-based enumeration: Supermarkets can use access-based

enumeration to hide a specified folder from users' view. Instead of


allowing users to see the folder but not access anything on it, one can
choose to prevent them from seeing the folder at all. It can configure
access-based enumeration for a clustered shared folder in the same
way as for a non-clustered shared folder.
Offline access: It can configure offline access (caching) for a clustered

shared folder in the same way as for a non-clustered shared folder.


Clustered disks are always recognized as part of the cluster:

Whether to use the failover cluster interface, Windows Explorer, or the


Share

and

Storage

Management

snap-in,

Windows

Server 2008

recognizes whether a disk has been designated as being in the cluster


storage. If such a disk has already been configured in Failover Cluster
Management as part of a clustered file server, it can then use any of
the previously-mentioned interfaces to create a share on the disk. If
such a disk has not been configured as part of a clustered file server, it

TECHNICAL ASPECT | 105

cannot mistakenly create a share on it. Instead, an error indicates that


the disk must first be configured as part of a clustered file server
before it can be shared.
Integration of Services for Network File System: The File Server

role in Windows Server 2008 includes the optional role service called
Services for Network File System (NFS). By installing the role service
and configuring shared folders with services for NFS, you can create a
clustered file server that supports UNIX-based clients.
3. Back-up and recovery (Incremental or Full Data Back-up)
In general, backup and recovery refers to the various strategies and
procedures

involved

in

protecting

database

against

data

loss

and

reconstructing the database after any kind of data loss.


A backup is a copy of data from database that can be used to
reconstruct the data. Backups can be divided into physical backups and
logical backups. Physical backups are backups of the physical files used in
storing and recovering database, such as data files, control files, and archived
redo logs. Ultimately, every physical backup is a copy of files storing
database information to some other location, whether on disk or some offline
storage such as tape. Physical backups are the foundation of any sound
backup and recovery strategy. Logical backups contain logical data (for
example, tables or stored procedures) exported from a database with an
Oracle export utility and stored in a binary file, for later re-importing into a
database using the corresponding Oracle import utility. Logical backups are a
useful supplement to physical backups in many circumstances but are not
sufficient protection against data loss without physical backups.
Errors and failures requiring recovery from backup are user error and
media failure. User errors occur when, either due to an error in application
logic or a manual miss-step; data in database is changed or deleted
incorrectly. Data loss due to user error includes such missteps as dropping

TECHNICAL ASPECT | 106

important tables or deleting or changing the contents of a table. While user


training and careful management of privileges can prevent most user errors,
backup strategy determines how gracefully recover the lost data when user
error does cause data loss. A media failure is the failure of a read or write of a
disk file required to run the database, due to a physical problem with the disk
such as a head crash. Any database file can be vulnerable to a media failure.
The appropriate recovery technique following a media failure depends on the
files affected and the types of backup available.
For performing backup and recovery based on physical backups, you
have two oracle and backup solutions available: recovery manager and usermanaged backup. Recovery Manager, a tool (with command-line client and
Enterprise Manager GUI interfaces) that integrates with sessions running on
the Oracle server to perform a range of backup and recovery activities, as
well as maintaining a repository of historical data about your backups The
traditional user-managed backup and recovery, where you directly manage
the files that make up your database with a mixture of host operating system
commands and SQL Plus backup and recovery-related capabilities. Both
methods are supported by Oracle Corporation and are fully documented.
Recovery Manager is, however, the preferred solution for database backup
and recovery. It can perform the same types of backup and recovery available
through user-managed methods more easily, provides a common interface for
backup tasks across different host operating systems, and offers a number of
backup techniques not available through user-managed methods.
Full and Incremental Backup
Most backup strategies start with a complete backup of the database
server, from which can restore all databases and tables. After one full backup,
It might do incremental backups (which are smaller and faster) for the next
several backup jobs. Periodically, it then does another full backup to begin
the cycle again. This section outlines some of the considerations for making
this most basic kind of backup. Because a full backup can take longer and

TECHNICAL ASPECT | 107

produce larger backup files, the decisions about speed, capacity, and
convenience are especially important for this part of the backup strategy. An
incremental backup only backs up data that changed since the previous
backup. This technique provides additional flexibility in designing a backup
strategy and reduces required storage for backups. Incremental backups are
typically smaller and take less time than a full backup, making them a good
choice for frequent backup jobs. Taking frequent incremental backups ensures
it can always restore the database to the same state as a few hours or days
in the past, without as much load or storage overhead on the database server
as taking frequent full backups.
Power back-up design
There are several problems that can disrupt the computer center
operations such as total power failures, brownout, power fluctuations, and
frequency variations. To prevent these problems, Technocart Corporation

should use power backup equipment that support electrical systems


such as voltage regulators, surge protectors, generators, and backup
batteries to allow the computer system to shut down in a controlled
manner and prevent data loss and corruption that would otherwise
result from an uncontrolled system crash.

NETWORK DESIGN
1. Network Layout
This phase is the planning stage of network design. This refers to
layout of a network and how different nodes in a network are connected to
each other and how they communicate. Layouts are either physical or logical.
Physical layout is usually created by the developer of the system. Each
computer is connected to the hub and a cable line represents how it is
connected. This includes placement and installations of routers, hubs,

TECHNICAL ASPECT | 108

bridges, switches, cables, and the like. The consideration of how each
computer system on the network is used is a very important part of computer
and network security. These considerations can even be used to enhance cost
savings where necessary. Logical layout refers to connectivity. The system
developer will have a valuable reference guide for troubleshooting, training
new employees and aid outside vendors that may need to understand the
network
Once the RFID scanner on the cart scans an item, it automatically
transmits information on the Radio Frequency Module. This module passes
information on the cloud server with the help of a switch connected with two
lines of cables for faster transmittance of information on the cloud server.
This process from the switch to server is called NIC Teaming. Server has two
functions: database and application. Database contains all the details of
every product on the supermarket such as current prices, sizes, and etc. RFID
writer place on the warehouse that programs blank RFID stickers provides
this detailed information to the RF Module then to the cloud server.
Application serves as a mediator between the cart, counters, warehouse, and
RF Module. The server gives back detailed information of the scanned item
back to the RF Module. After payment, the RF module receives the finalized
information and reconciles with the staging process information. Reconciled
data is now ready to transfer to the server.

TECHNICAL ASPECT | 109

TA_Illustration#33: Network Layout

2. Implementation
Network is very important because this makes the business more
efficient and competitive. Implementation phase is where all the planning in
network layout is executed. It includes analyzing requirements, installation,
configuration, customization, running, testing, systems integrations, user
training,

delivery

and

making

necessary

changes.

Software/hardware

implementations should always be designed with the end user in mind and
the implementation process usually benefits from user involvement and
support from managers and other top executives in the company. If users
participate in the design and implementation of the system, ideally it will
serve their business objectives more accurately and reflect their priorities
and the ways in which they prefer to work. Their involvement in the process
also makes them more receptive to changes that need to be implemented
because they have first-hand experience of what the system comprises.

TECHNICAL ASPECT | 110

DISASTER RECOVERY PLANNING


Disaster is an occurrence that causes great distress or destruction. It
can be extremely harmful to an organization's computer center and
information systems. It could be natural disasters, human-made disasters or
systems failure. To survive such an event, it is necessary to develop recovery
procedures and formalize them into a disaster recovery plan (DRP). Disaster
Recovery Planning refers to a recovery system where Technocart Corporation
can provide a back-up data of the supermarkets when their data was lost
because of various disasters.
Statement of Intention
The purpose of this statement is to addresses technical recovery only
in the event of a significant disruption. The intent of the DRP is to be used in
conjunction with the business continuity plan Technocart has.

A DRP is a

subset of the overall recovery process contained in the Technocart. Plans for
the

recovery

of

people,

infrastructure,

and

internal

and

external

dependencies not directly relevant to the technical recovery outlined herein


are included in the Business Continuity Plan and/or the Corporate Incident
Response and Incident Management plans corporations has in place.

Objectives
Technocart Corporation has come up with the following objectives in its
Disaster Recovery Plan.

Immediately mobilize a core group of leaders to assess the technical

ramifications of a situation;
Set technical priorities for the recovery team during the recovery

period;
Minimize the impact of the disruption to the impacted features and

business groups;
Stage the restoration of operations to full processing capabilities;

TECHNICAL ASPECT | 111

Enable rollback operations once the disruption has been resolved if


determined appropriate by the recovery team.

Implementation

g
F
D
h
m
U
p
ln
P
te
a
d
iR
u
A
s
I
k
B
ry
v
o
c
T
S

TA_Illustration#34: DRP
Disaster Recovery Team

Implementation

The Disaster Recovery Plan should be prepared by the Disaster


Recovery Team. It includes representatives from all departments and
personnel under Management Information System. The team needs to
prepare a time line to establish a reasonable deadline for completing the
plan.

Business Impact and Risk Analysis


The disaster recovery team conducts risk analysis and the related
business impact analysis that includes a range of possible disasters,
including natural, technical and human threats. Each functional area of the

TECHNICAL ASPECT | 112

organization is analyzed to determine the potential consequence and


impact associated with several disaster scenarios. The risk assessment
process also evaluates the safety of critical documents and vital records.
Risk Management
Risk Assessment is one of the key components of disaster recovery
planning. In order to create the most effective plan for recovering after a
calamity, an organization must first consider what the potential disasters are
that they could feasibly encounter, and how each of these might impact their
business continuity.

Brief Description Of Potential Consequences & Remedial


Actions

Potential Disaster
Flood

All critical equipment is located on the same floor. Only


second floor is occupied

Fire

No fire and smoke detectors on all floors.


Proposed to be included in the leasehold improvements

Act of terrorism and sabotage

Electrical power Failure

Securities are well maintained in the area and personnel


are all aware of emergency landline
Redundant battery array together with auto standby
generator that is tested weekly & remotely monitored
24/7.

TA_Illustration#35: Risk Management


Recovery Strategies
Depending on the manner in which supermarkets and Technocart
Corporation agree to copy the back-up data, supermarkets can get the
data by means of full data back-up or incremental data back-up.

TECHNICAL ASPECT | 113

Full Data Back-up In this method of gathering and storing the backup data, the supermarkets personnel as assisted by data back-up
personnel shall copy the data only at once. All relevant data are
summarized and filed into one folder and this folder is then copied in a
hard drive.
Incremental Data Back-up Under this method, relevant data are
copied and stored in the supermarkets record little by little. It is a
continuous process of copying and saving. It ceases upon all needed data
are already copied. It is usually done when there are large files of data
needed to back-up.
Build and Test Recovery Plans

The written plan provided by the Disaster Recovery Team must provide
for both major and minor disasters and must address individual and
community-wide natural disasters such as tornados and general flooding. It
must also include specific methods for contacting team members and
alternates, vendors, support agencies, suppliers, consultants and all those
with whom special disaster contracts and agreements are in effect.
The recovery plan must also provide for initial and ongoing employee
training. Trained personnel are needed in the reconstruction and salvage
phases of the recovery process. The initial training is to be accomplished
through professional seminars and special in-house educational programs. It
helps overall organization and communication along with individual jobs and
makes the knowledge of systems, equipment, facilities, procedures, etc.
Stronger and recognition for the business continuity program and emergency
management. It also helps to make sure that the corporations are complying
with local codes, regulations, and laws. It shows any weaknesses or need for

TECHNICAL ASPECT | 114

more resources and determines the efficiency of plans, policies, and


procedures as well as the skill and knowledge of the employees.
The recovery plan must not only provide details of back-up but also the
order in which data are restored. This includes complex computing functions
where accounts receivable, payroll, and accounts payable have fluctuating
priorities throughout the month.

DRP Exercising

Performing routine drills and exercises helps to strengthen everyones


performance. Different kinds of exercises are out there to help determine if
emergence

preparedness

program

is

capable

of

protecting

facilities,

employees, environment, and business operations.


After disasters it is often said that the exercises performed beforehand
were the best preparation for the incident. The exercises need to get people
working together to respond to the hypothetical threat. The exercises help
employees gain more knowledge of the plans, improve their performance,
and find places for improvements.
Exercises are great for:

Increasing the awareness and knowledge of hazards and their impacts

Validating education and training

Improving the coordination of inside and outside teams

Measuring the improvement of the performance objectives

TECHNICAL ASPECT | 115

Getting feedback and recommendations for improvement

Clarifying responsibilities

Testing or validating changes to procedures

Determining gaps and deficiencies

Evaluating the entire preparedness program

Assessing the existing resources capabilities and determining the need


for more resources

Audit and Update Plans


The recovery plan is reviewed by the Disaster Recovery Team and
update and replace by a new process in case they think that it must be.
Revisions are to be done in order to improve process and make data more
reliable and secure.
INSURANCE
In order to secure assets of Technocart Corporation, the corporation
itself enters into an insurance policy agreement that insured its property in
case of emergency. Its insurance agency is the Prudential Guarantee located
at the 3rd Floor of Prudential life Building, Sto. Rosario Street Angeles City,
Pampanga, Philippines with a telephone number of (045) 323-4274
The Fire Insurance policy undertakes, for a premium and subject to
conditions embodied in the policy contract, to pay or make good to insured
the direct loss or damage to a particular property caused during a specific
period by fire, lightning, or by other insured perils.

TECHNICAL ASPECT | 116

The Fire Insurance basically covers loss or damage to property caused


fire and lightning. However, the coverage may be extended to include,
among others, the following perils, subject to payment of additional premium:

Earthquake Fire / Shock


Typhoon
Flood
Riot, Strike and Malicious Damage
Extended Coverage (which includes the perils of smoke, explosion,

falling aircraft and impact of vehicles)


Broad Water Damage
Sprinkler Leakage
Accidental Bursting and/or Overflowing of Water Tanks, Pipes and
Apparatus

TECHNICAL ASPECT | 117

TECHNICAL ASPECT | 118

GANTT CHART FOR DISASTER RECOVERY PROGRAM

Days

Activities

1
1 2 3 4 5 6 7 8 9 0

1
1

1
2

1
3

1
4

Disaster Recovery Process


Set up database
Set up network
Data validation
Reconcile data
TA_Illustration#37: Gantt Chart for

LOCATION SET-UP

DRP
In order for the business to sustain its operations, it must be situated in

a place that provides the necessities for an organization to operate. Also, it


has to be close to the vicinity of market, accessibile to current and potential
customers and it must have a fast and stable internet connection. In order to
meet this necessities, Technocart Corporation has preferred the location of
Benigno S. Aquino Ave., Baliuag, Bulacan as its principal office and Bagong
Sikat, San Roque, San Luis, Pampanga as its warehouse location.
PRINCIPAL OFFICE: Ground Floor, J & E Building, Benigno S. Aquino
Ave.,

Baliuag,

Bulacan
GEOGRAPHY
The

municipality

of

Baliuag lies to the core


of Bulacan, Region 3
with an area near to
4,505

hectares.

The

northern part stretches


to Candaba,

TA_Illustration#38: Office Location

TECHNICAL ASPECT | 119

Pampanga; San Rafael, Bulacan is at its east; Plaridel, Bulacan on the south;
and Apalit, Pampanga on its west.

UTILITIES

Power
The power supply comes from and is provided by Manila Electric
Company (MERALCO) that has a nearby branch office at Rizal St., San
Jose, Baliuag, Bulacan which is about 4.04Kms away from the office.

Water
Baliwag Water District (BWD) provides the water supply in the area of
Baliwag. The local water district is just a few blocks away with 277meters
distance from the office.

Communication
Telephone and mobile phones signals are properly distributed by
SMART and GLOBE throughout the area. Internet connection will be
provided by PLDT Home DSL because it offers the most reliable internet
connection in the area.

Transportation
The municipality of Baliuag, as located at the core of Bulacan, offers a
great accessibility for public and private commuters. The office can be
accessed from Manila with its proximity near to Pulilan Toll Exit and Sta.
Rita Toll Exit. Also, North Luzon Expressway (NLEX) can also be accessed
through the Plaridel by-pass road down to Balagtas Toll Exit.

TECHNICAL ASPECT | 120

TA_Illustration#39: Main Office Floor Plan


TA_Illustration#39: Main Office
Floor

TECHNICAL ASPECT | 121

WAREHOUSE

LOCATION:

BagongSikat,

San

Roque,

San

Luis,

Pampanga
GEOGRAPHY
Transportation,
trade

and

commerce in San
Luis

is

concentrated

at

the

town

center

where the public


market, municipal
hall,

church,

schools,

hospital,

clinics,

and

commercial spaces
are situated.
TA_Illustration#40: Warehouse
UTILITIES

Location

Power
Pampanga I Electric Cooperative (PELCO I) located at Sta. Monica, San
Luis, Pampanga provides electricity in the area and which is about
3.71Kms away from the warehouse.

Water
The water source in the area is provided by the National Waterworks
and Sewerage Authority (NaWaSA) which has its office located at San
Fernando City, Mabalacat City, and Olongapo City.

Communication

TECHNICAL ASPECT | 122

SMART and GLOBE companies provide a wide coverage of mobile


phone signals all over the area. Globe companies will be the provider of
the internet connection in the warehouse location.

Transportation
Pampanga accommodates accessibility to expressways that has made
trading with other regions possible. North Luzon Expressway (NLEX)
connects Pampanga to Manila, Subic Clark Tarlac Expressway (SCTEX)
joins Pampanga to southern part of Luzon and Tarlac Pangasinan La
Union Expressway (TPLEX) ties Pampanga to northern part of Luzon.

TECHNICAL ASPECT | 123

TA_Illustration#41: Warehouse Floor


Plan

TECHNICAL ASPECT | 124

You might also like