08448380779 Call Girls In Friends Colony Women Seeking Men
PetPooja
1. ISM Project
Informationsystemaboutthecompany
Information system is any organized system for the
collection, organization, storage and communication
of information. More specifically, it is the studies of
complementary networks the people and
organizations use to collect, filter, and process, create
and distribute data.
SUDHEER GADDE-16BSP2589
7/25/2016
2. 2 | P a g e
Acknowledgement
This project work, which is us first step in the fieldof professionalism,
has been successfully accomplished only because of timely support of our
well-wishers. We would like to pay our sincere regards and thanks to those,
who directedusat everystepin ourproject work.
First of all, I would like to express my thanks to our Management
Information SystemsfacultyMr.Pranav Gosalia,forgivingsuch a wonderful
opportunityto widen the horizonsof myknowledge.
Despite all efforts,we have no doubt that errorandobscuritiesremain
that seen to afflict all writingprojectsandforwhich we are culpable.
3. 3 | P a g e
Introduction- Yuvi The Cafe
Coffee, friends and conversations at Yuvi Cafe is the perfect combination to create and re-
create memories. Yuvi Cafe started in the year 2015 under the able leadership of Mr. Vijay Singh.
Mr. Singh has an experience of over 18 years in hospitality industry both as an employee and as a
serial entrepreneur. It was his vision to think big and grow big that Yuvi Cafe has manifested into a
multi-outlet organization within a very short span of time.
Coffee shopshave longbeenpartof cultural aspectof any society.Yuvi Cafe’scoffee smoked
ambience along with impeccable quality of the service and extensive menu are the USP of Yuvi.
Yuvi- a fusion of you and we puts the “you” part or your customers at the priority.
Yuvi cafe issoonrisingto become the mosthangoutjoint.AnyYuvi outletwhether company
ownedorfranchise isdesignedwiththe customersinsighttoprovide the rightkindof vibesto make
the visit a memorable one. For lighter moods engaging teenagers and college goers to providing a
quietcornerfora cosycouple and for a gang to hang out to discussing business- Yuvi Cafe provides
them all.
They have indoor as well as outdoor seating arrangements to suit the moods of the
customers.The endlesslistof snacksandmunchingto complementthe coffee, whether hot, piping,
and simmering or cold with ice-cream, makes it a pocket-friendly combo to go for.
4. 4 | P a g e
Introduction about the software system
Petpooja (namely Prayosha Food Services Pvt. Ltd.) started as a restaurant integrator
platform for corporate in 2011
o Tie up with more than 250 + Restaurants.
o Currently serving more than 1000 + corporate.
Introducing “PETPOOJA”
The finest restaurant management platform to manage
o Daily Operations
o Billing
o Online Ordering
o Marketing
o Analysis
Most Important
o Through “PETPOOJA” it’s easier to increase their business online
o ‘PETPOOJA” is available at zero cost for lifetime
o It does not have AMC Charges
o ‘PETPOOJA” is developed for all types of restaurant and restaurants chains
o Centralized Automagic Menu Updation
Current market
o Gujarat, Mumbai, Pune, Nagpur, Hyderabad, Delhi, & Bangalore.
o Live at 500+ restaurants
o International expansion started in 2015.
5. 5 | P a g e
Objectives for IS implementation
The information written on paper/Documents is incorporated into an ERP System.
To access the system by all the employees.
To know the business details at any time.
Various functional modules of IS
Inventoryand StockManagementModule
Real-time inventory and ingredient tracking.
Set minimum stock and maximum stock.
Initiate transfer between different sub stores or departments from the main store.
HeadOffice Module
Maintain stock and inventory management from head office for all the connected
branches/franchise stores.
Update various reports from the branch/franchise to the head office.
Update menuand stock itemsfromheadoffice toa specificrestaurantbranchorto all of the
branches.
SMS & Email NotificationModule
Confirmation notification for table reservation.
Banquet reservation notification.
Notification to head office/management of daily reports and other updates.
Receive feedback related notification.
Payroll Module
Maintain employee time attendance with bio-metric system, card scanners or logging in
manually.
Maintain employee salary list, tax deductions, advance loan payment or any payment
applicable.
Create and manage employee work schedule, breaks, leave management, etc.
7. 7 | P a g e
IS support employee’s productivity and customers satisfaction
Create an open and communicate environment: By centrally locating the performance
appraisal information within a formal online framework, managers can more easily
communicate business strategy and create measurable goals for their employees that will
support overall company objectives.
Connectteam virtually withinthe company: Create employeeportalsandteamsitestohelp
people work productively across the organization, no matter what location or team.
Motivates your employees using technology: Based upon the information gathered in an
online performance evaluation,managerscancompare currentskillswiththose required for
advancementorother recognition or reward opportunities that present themselves as the
manager tracks progress on employee goals throughout the year.
Monitor business productivity and employee progress on goals: Online business
productivitysoftwaresolutionsenable managersto more easily track progress during every
phase of goal completion and offer immediate reinforcement or coaching to keep
performance and deadlines on track.
Analyse performance: Today’s technology provides advanced reporting and business
analysis capability to help you gain a deep understanding of business performance,
customer preferences, and market trends.
8. 8 | P a g e
The nature of business and competition changed by IS
Communication:Smartphonesraise the barwithaccessto the internet,email andbusiness
applications in a small hand held devices. Email, text messaging and social businesses
connected to their customer bases and improve internal communication within the
company.
Marketing: Technologyhasfreedsmall businessesfromthe restrictions of prints ads when
it comesto reachingnewandexistingcustomers.Internet marketing ranges from a simple
informational website, to advertising on search engines, to online product sales.
Productivity: Small businesses need to write every ounce of productivity out of their
operations and technology tools help employees get tasks done more quickly.
CustomerService:Technologybringsbusinessesclosertocustomers.Businesses use email
to answer questions, offer online chat to help customers that are visiting the business
website, and equip call centres with the latest phone equipment that makes customer
service agents more efficient. Give customers a choice of ways to contact the company.
Telecommuting:Many small businessesnow offertelecommutingandflex time asbenefits.
Colleaguescanstayintouchfrom differentlocations,andwhenworkingdifferenthours, by
using email, online collaboration tools and mobile computing devices.
Teleconferencing: Teleconferencing over the phone is one of the simplest conferencing
methods,butadvancementinrecentyears hasbroughtwebconferencingto the fore. Web
conferencingcanbringtogetherwebcams,audioand collaborative online meeting spaces
to create an extremely interactive environment.
9. 9 | P a g e
Scalability of IT infrastructure
Scalabilityisabilityof asystem,networkorprocesstohandle a growingamount of work in a
capable manner or its ability to be enlarged to accommodate that growth.
For a growing business, a shared communication line may be all that is needed to ensure that
the office canaccess the Internet.However, more complicated online communication needs mean
that you’ll alsohave greaternetworkbandwidthneeds.Asa company adds more users, the need to
do more downloading or transferring of files, will require more bandwidth and faster speeds, the
original network equipment needs to be able to handle that traffic. By understanding what future
needsare likelytobe,anetworkarchitectcan choose equipmentthatwill be able to grow with you.
Configure servers to allow for additional capacity.
While expanding the business it needs to be adjusted or improved.
10. 10 | P a g e
Security measures, data backup, user authentication
1. Use a strong password: A strong password is the best way to protect yourself against
identify theft and unauthorized access to your confident information. Read our tips for
creating a strong, memorable password.
2. Protect confidential information: Students,staff,andfacultyall have access to information
that mustnot be shared, including your password. Familiarize yourself with the applicable
laws and policies which govern these records and act accordingly.
3. Make sure your operating system and virus protection are up-to-date: That way, you’ll
avoid becoming vulnerable to hackers and other looking to seal information. You are
required to do this before you can connect to the HSU wireless network.
4. Use secure and supported applications: Any software you install has the potential to be
exploited by hackers and others looking to steal information. You are required to do this
before you can connect to the HSU wireless network.
5. Be wary of suspiciouse-mails:Don’tbecome a phishing victim. Learn how to recognize the
signof a hidden attack.Neverclickona linkinan email;if you’re tempted,cutand paste the
URL intoyourbrowser.That, way these goods chase your browser will block the page if it’s
bad. And don’t open email attachments until you’ve verified their legitimacy with the
sender.
6. Store confidential onlyonHSU serves: CDs,DVDs,and USB drivesare all convenient ways to
store data; the trouble is, they’re just as convenient for thieves as for you. Wherever
possible, store confidential information in your network folder or other protected central
space.If you muststore confidential informationlocally,youmustencryptitandthendelete
it as soon as you no longer need it.
7. Back up your data.... and make sure you can restore it: If your computer becomes infected
of the hardware fails, you may be unable to retrieve important information. So make sure
your data is backed up regularly – and test that backup from time to time to make the
restore correctly. Check with your ITC or the Technology Help Desk if you need help with
this. You can also read more on how to protect against a data disaster.
8. Protect informationinall its forms:Protecting your digital data is important. But paper and
the humanvoice remainimportantelementsof the security mix. Keep confidential printed
informationinlockedfile cabinetsand shredded when no longer required. If you’re talking
about confidential information on the phone, take appropriate steps to ensure you’re not
overheard.
11. 11 | P a g e
9. Learn to be security-aware:Take advantage of the information security awareness training
that’s freely available on the web. If you have haven’t received an invitation to take the
training, contact iso@humboldt.edu for the appropriate link.
12. 12 | P a g e
Security measures, data backup, user authentication by PETPOOJA
1. We have implemented appropriate physical, electronic and managerial procedures to
safeguard and help prevent unauthorized access to your information and to maintain data
security. These safeguards take into account the sensitivity of the information that we
collect,processandstore and the currentstate of technology.We followgenerallyaccepted
industry standards to protect the personal information submitted to us, both during
transmission and once we receive it.
2. However,nomethodof transmissionover the Internet or via mobile device, or methods of
electronicstorage,is100% secure.Therefore,we cannotguarantee itsabsolute security and
thereby usage in a manner that is inconsistent with this Privacy Policy.
3. We assume no liability or responsibility for disclosure of your information due to errors in
transmission,unauthorizedthird-partyaccess,orother causes beyond our control. You play
an important role in keeping your personal information secure. You should not share your
user name, password or other security information with anyone if we receive instructions
using your username and password, we will consider that you have authorized the
instructions.
The image of the unlock code for the PETPOOJA system
13. 13 | P a g e
Benefits BY IS
S.No. Concern Responses
1 Enhanced Technology Current legacy system is
archaic.
2 Efficiency A new system will eliminate
labour-intensive manual
processes and current
duplication of efforts
3 Integrated Information Integrating different systems
and data sources
4 Reporting Need to be able to generate
reports without asking IT
5 User friendly Easierto use for functional staff
6 Access to data Increased self-service for data
needs
7 Customer service Provide betterandmore timely
services to students
8 Functionality Eliminate problems without
grown data tables
9 Communication Improved communication
between institutions and
regional campuses
10 Security A new systemwill improve data
integrity and security
14. 14 | P a g e
Types of reports and charts generated by IS
All of our company restaurants use computerized management information system, which
are designedtoimprove operatingefficiencies,providerestaurantand SupportCentre management
with timely access to financial and operating data and reduce administrative time and expenses.
Withour current informationsystems,we have the ability to generate reports showing weekly and
period-to-date numbersona company-wide, regional or individual restaurant basis. Together, this
enablesustoclosely monitorsales, food and beverage costs and labour and operating expenses at
each of our restaurants.We have createdreportsthat provide comparative informationthatenables
both restaurant and Support Centre management to supervise the financial and operational
performance of our restaurants and to recognize and understand trends in the business.
Reports by PETPOOJA
1. Pie charts
2. Bar graphs
3. Flow charts
4. Column charts
15. 15 | P a g e
Conclusion
ManagementInformationSystems issetsof inter-relatedproducts usinginformationsystem
infrastructure in a business enterprise to generate and disseminate the desired information. Such
systemsare designedtosupportdecision-makingbythe people associatedwiththe enterprise inthe
processof attainmentof its objectives. The MIS gets data and other resource of IT infrastructure as
inputs from the environment and processes them to satisfy the information needs of different
entitiesassociatedwiththe businessenterprise. There are subsystems of control over the use of IT
resourcesandfeedbacksystemoffersuseful cluesforincreasingthe benefits of information system
to business. The MIS are subsystem of business system and by themselves serve the functions of
feedback and control in business system.