Contact us today!

Network Solutions Unlimited Blog

How to Calculate if That Print Job Was Really Worth It

How to Calculate if That Print Job Was Really Worth It

There are a few sounds that are familiar to any office: keys clacking away, coffee being sipped (or slurped), and the rattling, squawking hum of the printer. Yet this image presents a crucial question: do you know how much your printer is costing your business each time it is used? In today’s blog, we’ll review how you can calculate this investment.

Why Cost-Per-Page is So Important
It is pretty common knowledge in the business world that, in order for a printer to properly print, it needs to have ink with which to print. This ink comes in the form of ink cartridges, which need to be replaced once the ink within them has been spent. These cartridges are, unfortunately, anything but cheap - and you usually have to purchase multiple to get the full benefits of a multicolor printer.

This is part of the reason that it is important for you to know your printer’s average cost-per-page (CPP), or at least have a figure that is reasonably close. If your business relies heavily on paper documents in its daily processes, these costs can be considerable.

How to Calculate the Average Cost-Per-Page
Despite different ink cartridges being made for a variety of different printers, the calculation to determine your CPP is relatively simple. All you have to do is divide the price of the cartridge by the cartridge yield rating, or how many pages the cartridge should be expected to print. This number can be found on the cartridge’s packaging.

So, if you spent $25 on a cartridge of black ink with a yield of 525 pages, your formula would look like this...

25/525 = 0.048 you a cost of about 5 cents per page.

Calculating CCP in More Complicated Printers
The fact that not all ink cartridges are the same can add a step or two to this calculation. Since many modern printers now rely on different cartridge configurations, like an individual cartridge for each color (black, cyan, yellow, and magenta) or two cartridges that cover them all (black, and cyan, yellow, magenta). Regardless, your calculation will be more or less the same, with minor adjustments to account for how the colors are clustered or divided.

Basically, when adding color into the equation, find the CPP of each color and combine your totals - including black. It is important to remember that when printing something in color, you’re apt to use just as much, if not more, black ink as well.

Furthermore, it is important to consider that ink cartridge manufacturers will often base their yield rating on standardized business documents, with a certain percentage of the document being covered in ink. Therefore, printing something that doesn’t fit into these constraints will throw off the yield, which can happen based on what kind of document you are printing, and even what kind of paper you’re using.

Controlling Your Prints
Calculating your investment into each print can also provide you with some invaluable insight into the goings-on at your office. Mostly, it may show you that you are spending far more than you should be on printed materials.

Network Solutions Unlimited can help with that. We can help you implement the solutions that will allow you to cap each user’s printer use, streamlining and optimizing your ability to use it and remain fiscally responsible. Alternatively, we can also offer collaboration solutions that can help reduce your reliance on physical documents entirely.

Give us a call at 217-428-6449 to learn more!

Tip of the Week: Work Commands for Google Home
Sorry Han, When it Comes to Security, You Need to ...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, September 22 2018

Captcha Image

Mobile? Grab this Article!


Tag Cloud

Apple Cost Management Retail Data Storage Managed IT Budget Touchscreen Data Privacy Microsoft Word Managing Stress Instant Messaging Public Cloud Firewall App Business Owner Hiring/Firing Education Wireless Charging Privacy Encryption Lifestyle Virus Consultant How to Phone System Streaming Media CrashOverride Remote Monitoring Automation IoT Television Server Health Legal Solid State Drive Devices User Tips Monitor Router Outlook Google Drive Chrome Entertainment HBO Tablets Users Robot Edge Hardware Identity Update Excel Security Employer Employee Relationship Worker Commute Gamification Internet of Things SaaS Adobe Mobile Device Twitter Dark Web Save Money Wi-Fi Updates Windows 10s Projects Virtual Assistant Data Theft Microsoft Excel Chromebook Monitors History Augmented Reality Troubleshooting Samsung Workplace Tips WiFi hacker Internet Exlporer Business Technology Connectivity Hybrid Cloud Regulation Credit Cards Vulnerability User Error Financial Technology Malware Bluetooth Licensing Gifts Managed Service Provider Legislation Customer Content Filter Wireless Internet Smartphone Computer Forensics Law Enforcement Virtual Reality Productivity How To Emergency Best Practice Storage Microsoft Office Office Relocation iOS Rootkit Spam Blocking Efficiency Data Loss Wasting Money HaaS Android Automobile Gadgets Amazon Cybercrime Money Techology Hard Drive Nanotechnology Network Artificial Intelligence IT budget Spyware The Internet of Things Backup Compliance Computing Infrastructure Emails Congratulations Marketing Camera Safety Audiobook Smartphones Hard Disk Drive Shadow IT Scam Search Management Travel Facebook Humor Mobile Security Files Disaster Recovery Telephone Systems Benefits Government Settings Cloud Computing Charger Communication IT Management Google Passwords Ransomware IT Support Cache Risk Management Unified Communications Cybersecurity Content Filtering Chromecast BDR Transportation Collaboration Windows Ink Mobility Gmail Bandwidth Electronic Medical Records Websites Going Green Vendor Advertising Social Media Workers Training Cast intranet Language FAQ Business Computing Antivirus Managed Service Employer-Employee Relationship Virtualization Books File Storage VPN Upgrades Software as a Service Managed IT Services VoIP Hackers Blockchain Data Protection Cleaning Data Recovery Value Information Printers Screen Mirroring IT Solutions Sales Office Tips Shortcut Professional Services Experience Maintenance Thank You Mobile Password Two-factor Authentication Innovation Black Market Content Data Security Computer Care Small Business Network Security Downtime Operating System Mobile Device Management Patch Management Proactive Computer Microsoft Colocation Cortana Meetings Recovery Webinar Company Culture Computers MSP PowerPoint Alert Students Browser Document Management Vendor Management Upgrade Windows 10 Unsupported Software Identity Theft Mobile Devices Memory Communications Outsourced IT Business Continuity Physical Security Business Reputation Unified Threat Management Work/Life Balance Printing WIndows Server 2008 Saving Money IT solutions Remote Computing Office 365 Technology Data Backup Google Maps Sports Worker Word Financial Internet exploMicrosoft HIPAA Computer Fan Google Docs Assessment Apps Keyboard NFL Specifications Conferencing iPhone Internet Root Cause Analysis WannaCry WPA3 Hacking Analysis Administration Sync Email Business Intelligence Tech Support Video Games Alexa for Business Windows Audit Data Management Applications Hosted Solutions Software Scalability Cloud Flexibility Loyalty Personal Information Commerce Wireless Technology Device Security Identities Ciminal Tip of the Week Proactive IT Hosted Solution Miscellaneous Hard Drives USB Comparison Data Breach Application Social Engineering App store Holiday Bring Your Own Device PDF Two Factor Authentication Computing Windows 10 Private Cloud IT Support Business Management Laptop Information Technology Tech Term Managed IT Services Spam Phishing Monitoring OneNote Computer Accessories Data Employee-Employer Relationship eWaste Save Time IT Services Testing Networking Battery Project Management File Sharing Smart Technology Public Computer Wireless Touchpad BYOD Redundancy Data storage Evernote Productivity Quick Tips End of Support Best Practices Fraud Google Assistant Managed IT Service Avoiding Downtime Smart Tech Politics Big Data