Contact us today!

Network Solutions Unlimited Blog

How to Calculate if That Print Job Was Really Worth It

How to Calculate if That Print Job Was Really Worth It

There are a few sounds that are familiar to any office: keys clacking away, coffee being sipped (or slurped), and the rattling, squawking hum of the printer. Yet this image presents a crucial question: do you know how much your printer is costing your business each time it is used? In today’s blog, we’ll review how you can calculate this investment.

Why Cost-Per-Page is So Important
It is pretty common knowledge in the business world that, in order for a printer to properly print, it needs to have ink with which to print. This ink comes in the form of ink cartridges, which need to be replaced once the ink within them has been spent. These cartridges are, unfortunately, anything but cheap - and you usually have to purchase multiple to get the full benefits of a multicolor printer.

This is part of the reason that it is important for you to know your printer’s average cost-per-page (CPP), or at least have a figure that is reasonably close. If your business relies heavily on paper documents in its daily processes, these costs can be considerable.

How to Calculate the Average Cost-Per-Page
Despite different ink cartridges being made for a variety of different printers, the calculation to determine your CPP is relatively simple. All you have to do is divide the price of the cartridge by the cartridge yield rating, or how many pages the cartridge should be expected to print. This number can be found on the cartridge’s packaging.

So, if you spent $25 on a cartridge of black ink with a yield of 525 pages, your formula would look like this...

25/525 = 0.048 you a cost of about 5 cents per page.

Calculating CCP in More Complicated Printers
The fact that not all ink cartridges are the same can add a step or two to this calculation. Since many modern printers now rely on different cartridge configurations, like an individual cartridge for each color (black, cyan, yellow, and magenta) or two cartridges that cover them all (black, and cyan, yellow, magenta). Regardless, your calculation will be more or less the same, with minor adjustments to account for how the colors are clustered or divided.

Basically, when adding color into the equation, find the CPP of each color and combine your totals - including black. It is important to remember that when printing something in color, you’re apt to use just as much, if not more, black ink as well.

Furthermore, it is important to consider that ink cartridge manufacturers will often base their yield rating on standardized business documents, with a certain percentage of the document being covered in ink. Therefore, printing something that doesn’t fit into these constraints will throw off the yield, which can happen based on what kind of document you are printing, and even what kind of paper you’re using.

Controlling Your Prints
Calculating your investment into each print can also provide you with some invaluable insight into the goings-on at your office. Mostly, it may show you that you are spending far more than you should be on printed materials.

Network Solutions Unlimited can help with that. We can help you implement the solutions that will allow you to cap each user’s printer use, streamlining and optimizing your ability to use it and remain fiscally responsible. Alternatively, we can also offer collaboration solutions that can help reduce your reliance on physical documents entirely.

Give us a call at 217-428-6449 to learn more!

Tip of the Week: Work Commands for Google Home
Sorry Han, When it Comes to Security, You Need to ...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, June 24 2018

Captcha Image

Mobile? Grab this Article!


Tag Cloud

Proactive IT Identities Benefits Data Management End of Support iPhone User Tips Assessment Computer Forensics Electronic Medical Records Black Market Business Management Lifestyle Reputation Office 365 Analysis Content Filter Websites Management Recovery Passwords Internet Hosted Solution Webinar Managed IT Service Laptop Save Time Employer Employee Relationship Software as a Service Retail Network Security Outsourced IT Best Practices Hard Drives Computer Accessories Downtime Gamification Safety Bandwidth Quick Tips Best Practice Licensing Google Assistant Identity Theft Hard Disk Drive Project Management Cloud Hybrid Cloud Upgrade Managed IT Services Financial Technology Phone System Content PowerPoint Public Cloud IoT Consultant Government IT Solutions Cast Browser Wireless Charging Vulnerability Chromebook Language Cortana Books Work/Life Balance Screen Mirroring Data storage Meetings Loyalty Transportation Politics Fraud Cache Malware Mobile Device Remote Computing Updates Risk Management Email Going Green Scam Bluetooth Printing Windows Ink Solid State Drive Cost Management Dark Web Financial WannaCry Legislation Data Backup Virtualization Security Chromecast Congratulations Blockchain Regulation Data intranet Productivity Nanotechnology IT Support Professional Services Emergency Microsoft Excel Small Business Wi-Fi Data Protection Colocation Sync Memory Relocation Internet of Things Monitoring Public Computer Business Intelligence Money Data Loss Conferencing Humor Video Games BDR Miscellaneous Data Security Legal Workplace Tips iOS Ciminal Encryption Google Robot Avoiding Downtime IT Management IT Services Worker Backup Tech Support Users Efficiency Mobile Security Business Continuity Virtual Reality Windows 10s Worker Commute Server Upgrades Word User Error Tablets Remote Monitoring Ransomware Chrome eWaste File Sharing Innovation IT budget Smart Technology Battery Travel Monitor Experience Twitter Communications Microsoft Office Save Money Document Management Troubleshooting Touchscreen Spyware SaaS Storage Business Owner Law Enforcement Applications Unsupported Software Adobe Health Social Media Firewall Maintenance Employer-Employee Relationship Workers Smartphones Physical Security USB Managed IT Services Devices Technology Saving Money Cybersecurity Hardware Social Engineering Automobile Wireless Internet Instant Messaging FAQ Cloud Computing Virus Augmented Reality Keyboard Company Culture Google Docs Commerce Students Files Flexibility Smart Tech Microsoft Word Settings Cleaning Private Cloud IT solutions Computing Infrastructure Spam Blocking Phishing Business Computing Computer BYOD Shadow IT Vendor Management Gadgets Managing Stress Computer Fan How To Redundancy Proactive Unified Threat Management Education Collaboration VPN Advertising Software Computers Two-factor Authentication Internet exploMicrosoft HBO Techology Television Automation Connectivity Compliance Emails Audiobook App store Holiday Internet Exlporer Managed Service Provider Hacking Comparison Windows Search Outlook WIndows Server 2008 Mobile Device Management The Internet of Things Hard Drive Data Breach Personal Information History IT Support Computing Data Theft Microsoft Credit Cards Identity Wireless Sales Evernote Computer Care Apple Budget Networking Patch Management Privacy Excel Mobile Devices Google Maps Hosted Solutions Windows 10 Managed IT Application NFL Network Charger Administration HaaS Streaming Media Mobile Marketing App Operating System Spam Two Factor Authentication Facebook Thank You Big Data Disaster Recovery Windows 10 Scalability CrashOverride How to Router MSP Entertainment Communication Artificial Intelligence HIPAA Mobility Office Specifications PDF Device Security Tip of the Week Update Samsung Training Rootkit Unified Communications Sports Gmail Google Drive Gifts Telephone Systems Hackers Data Storage WiFi Office Tips Shortcut OneNote Business Android Password Root Cause Analysis Apps Value Monitors Data Privacy Alert Customer Tech Term Bring Your Own Device Touchpad Hiring/Firing Productivity Edge Antivirus Smartphone VoIP Information Technology Cybercrime Content Filtering Wireless Technology Audit hacker Data Recovery