Club IT, Part II
As a club that offers live music, dancing, and refreshments, the mission of Club IT is to “build a community that meets regularly at Club IT” (About Club IT, Our Mission Statement). The owners of Club IT, Ruben and Lisa, recognize that e-commerce is a market that other businesses within their trade have not taken advantage of. E-commerce is a market that is growing in popularity, and is becoming more and more common place.
Many of Club IT’s guests are of the net and millennial generations, and regularly use many different forms of wireless communication, so e-commerce is a logical addition to Club IT’s infrastructure. There are different types of e-commerce; this one in ...view middle of the document...
By doing business with Sysco, Club IT can create a supply chain management (SCM). Club IT and Sysco can share certain information about Club IT’s supply needs over a shared network, so that they can both access the same information and communicate directly through it. The supply chain management between Club IT and Sysco can help Ruben and Lisa to keep track of their inventory. They can compare what they physically have on hand to what is shown in their shared network. Ruben and Lisa will also be able to place orders for supplies, and track those orders. If they receive anything that is damaged or if they receive an order that was meant for another Sysco customer, this can also be handled through their shared network, and orders are delivered directly to Club IT.
Sysco can also see when Club IT’s inventory is low, and a system can be set up that would allow Sysco to automatically send supplies when Club IT’s inventory goes below an amount agreed upon by both parties. Sysco will also be able to see when orders were delivered and if any of those orders were rejected and are being returned.
. Payments for supplies can be made online through the Sysco website, or Ruben and Lisa can send physical checks as they are billed.
With expanding their infrastructure to include e-commerce, Club IT would benefit by using a third party company like VeriSign to operate their infrastructure. VeriSign, and companies like it, can encrypt the data so that cyber thieves cannot...