In our WMS you can create, display, edit, delete or filter customer and supplier data and export those (XLS, XLSX). By creating individual barcodes, supplier or customer orders can easily be assigned to the respective partner.
Furthermore it is possible to register, edit or delete material in the system. Data that can be stored are e.g. name, supplier, unit and necessary container size. Also the available container sizes can be defined in the system.
In our WMS you can create several warehouses, that can be divided into different areas with different storage locations. The layout of the warehouse can be adjusted at any time. The data of the organizational units can be exported as XLS-file.
Furthermore it is possible to create a barcode for every storage location, which can be exported as PDF-File and printed as storage labels.
All operations at the receiving or shipping area as well as in the warehouse itself are registered in the system protocol. Therefore operations become transparent and traceable - in real time. The storage positions and stock of all material are accessible and exportable (XLS).
In the goods receiving, purchase orders can be recorded directly in the system and compared to the actual goods received. Possible discrepancies are immediately visible. Our WMS suggests free storage positions in order to make optimal use of your storage area.
In case of a customer’s or production line’s order, this is recorded in the system, too. The availability of the ordered material is checked, the material allocated and the route-optimized picking list is created. After the completion of the picking process the material picked is compared to the order. If in agreement, the delivery note is created.
New users can be created or existing users be edited or deleted. Different users can be assigned to different user groups with specific access rights. Furthermore, single users can have individual access rights.
The Settings provide the possibility to create codelists, add scanners and operations and other configurations. All these operations are traceable in the system protocol.
All users can edit their personal data and their passwords on their own when logging in to the system.