- When creating an order, the cashier proceeds to enter information including order ID,name of items, quantity, din in or take away, table number, waiter name if any andtotal amount.- If
OVERVIEW
INTRODUCTION
Nowadays, many restaurants have been created to meet the demands of those who eat However, many restaurants still use the old method of ordering food This seemingly insignificant action takes a long time and occasionally results in errors If a crowded restaurant continues to allow this condition to occur for an extended period of time, it will influence employee work pressure and reduce satisfaction with customers.
To address the issue, our team developed a restaurant management system It is designed to streamline and enhance the operations of a restaurant or food service establishment and become an indispensable tool in the modern food service industry, harnessing the power of technology to improve efficiency, customer satisfaction, and overall business performance and minimize human errors The order processing and management process is run sequentially, simply but effectively Everything runs smoothly and makes the guests feel satisfied.
Incorporating the innovative restaurant management system into the cashier's computer system will revolutionize billing operations within small and medium-sized establishments This advanced solution empowers cashiers to effortlessly and precisely settle customer accounts, while simultaneously generating invoices for easy record-keeping.
- Learn programming techniques, how it works and objects in C#.
- Understand how SQL Server database management system stores data.
- Using C# language and SQL Server administration system to build software.
- Research some framework to build more effective functions
- Robust Programming Language: C# is a powerful and readable programming language, enabling rapid and efficient application development.
- Support for Object-Oriented Programming (OOP): C# supports OOP, aiding structured code organization and code reuse.
- Integration with NET Framework: C# seamlessly integrates with the NETFramework, a robust platform for developing Windows and web applications.
Disadvantages: Limitations for Cross-Platform Development: C# is primarily used for
Windows applications, and developing cross-platform applications may require additional measures.
- Popular Database Management System: SQL Server (or other SQL-based database management systems) is one of the most widely used database systems globally, with extensive support and documentation.
- Integration with C#: SQL Server integrates well with the C# programming language through ADO.NET, making database operations more straightforward.
- Powerful Query Support: SQL provides robust features for data querying, analysis, and reporting.
Disadvantages: Database Costs and Management: Database management systems like
SQL Server come with associated usage and management costs, especially in large enterprise environments.
The fast food software, programmed in C# and using SQL for the database, is designed with two main objectives:
- Gain in-depth expertise in the restaurant industry and the operational environment of the system:
- Ensure that this software is developed based on professional knowledge of the restaurant industry.
- Understand the operational processes and specific requirements of the restaurant environment.
- Develop an application with high practicality and ease of deployment:
- Develop an application that meets the real-world needs of users, especially those in the fast food business.
- Create a user-friendly and convenient interface, allowing users to perform tasks simply and quickly.
Fast food software is designed to enhance operational efficiency for restaurants by automating tasks, streamlining processes, and providing real-time data insights It assists businesses in seamlessly managing orders, payments, inventory, and customer relationships, ensuring quick and convenient service By leveraging technology, fast food software empowers businesses to optimize operations, enhance customer experience, and maximize profitability.
Our restaurant management system includes 3 main components:
- When creating an order, the cashier proceeds to enter information including order ID, name of items, quantity, din in or take away, table number, waiter name (if any) and total amount.
- If the customer buys for the first time, the cashier updates customer information into the database before create an order
- Manage food categories, enter and edit dish names, unit prices, quantities,…
- Manage all staff information: staff ID, full name, phone number, role (waiter, cashier, )
- When the cashier sends order information to the kitchen department, the kitchen staff executes the order and updates the order status.
After examining the current condition, the group discovered the following:
- Product management: the following information is used to manage the selling price: Product Image, Product Type, Product Name, and Unit Price are all required.
- Employee management: The following information is used to manage each employee: Employee information includes name, phone number, and role.
- Product type management: the following information is managed for each product type: Enter the product name.
- The sales procedure is as follows: When selling, the system will determine whether the number of items purchased by clients is in stock If it is, the quantity of products in stock will be updated Notify the amount is insufficient if it is out of stock When clients purchase goods, the system saves customer information, sales personnel, and order time The sales invoice will then be saved.
- Administrator (admin): The person who owns the system and has authority over all system actions To accomplish their tasks, the administrator is given a username and password to login to the system.
- If the login process is successful, the manager will be able to monitor and update product and staff information, check orders, and process orders.
Planning - Come up with ideas for the system interface.
- Identify system features and content.
Research - Research about consumer behavior
- Refer to other management systems
- Learn about the available technologies and the necessary functions
Create a restaurant management system with a user-friendly interface
- Point out the limitations of the system
Test the restaurant management system
- Testing and evaluating the system
Maintenance - Eliminate errors and upgrade restaurant management system
THE CURRENT STATUS SURVEY
After examining the current condition, the group discovered the following:
- Product management: the following information is used to manage the selling price: Product Image, Product Type, Product Name, and Unit Price are all required.
- Employee management: The following information is used to manage each employee: Employee information includes name, phone number, and role.
- Product type management: the following information is managed for each product type: Enter the product name.
- The sales procedure is as follows: When selling, the system will determine whether the number of items purchased by clients is in stock If it is, the quantity of products in stock will be updated Notify the amount is insufficient if it is out of stock When clients purchase goods, the system saves customer information, sales personnel, and order time The sales invoice will then be saved.
- Administrator (admin): The person who owns the system and has authority over all system actions To accomplish their tasks, the administrator is given a username and password to login to the system.
- If the login process is successful, the manager will be able to monitor and update product and staff information, check orders, and process orders.
PROJECT PROCESS
Planning - Come up with ideas for the system interface.
- Identify system features and content.
Research - Research about consumer behavior
- Refer to other management systems
- Learn about the available technologies and the necessary functions
Create a restaurant management system with a user-friendly interface
- Point out the limitations of the system
Test the restaurant management system
- Testing and evaluating the system
Maintenance - Eliminate errors and upgrade restaurant management system
SYSTEM ANALYSIS DESIGN
BUSINESS PROCESS
Figure 1: Business Process of Restaurant Management System
The main actors include the customer, cashiers, kitchen and delivery department We can divide them into two groups: the selling entity which is the restaurant, and the buying entity which is the customer.
The first event starts when the customer visits the website to select a menu and then chooses the quantity The restaurant offers three options: takeaway, home delivery, and dine-in The customer can choose one of these options If the customer selects dine-in, they will continue to choose a table and waiter If they opt for delivery, they provide information such as the delivery address and phone number Next, the cashier receives the order request, confirms it The customer will wait for notification to receive the orders At the same time, the kitchen will prepare the food When it's ready, the kitchen staff confirms completion to notify customers to come to the counter to pick up food If customers wait too long and do not receive notification,they can complain and urge the staff In case the customer chooses delivery, the delivery staff picks up the food at the counter and delivers it to the customer The customer receives the order and pays the bill.
USE CASE VIEW
Description Only users have access to the system
Actor Management staff, Kitchen staff, Cashier
Pre-conditions Users must have an account.
Flow 1 Users access the application
2 The application will display the login’s form 3a If the users select the function “Exit”, the application will be finished
3b If users select the function “Login”, the application will follow steps below
- Fill in the required user and password.
- The application will display the main interface (Home page).
Post- conditions If entered the correct information:
- Display the main interface (Home page)
If entered the wrong information:
- Display an error and requiring to re-enter
Table 3: UC - 2.0 Manage Category Information
Use case names Manage Category
Description Management staff enter catalogs for products including information: catalog code, catalog name
Pre- conditions Category codes are unique and do not overlap.
1 Management staff selects the enter category function
2 The system displays the enter category interface
3 Staff enters information into the catalog including catalog code and catalog name
4 Click "Add category" after filling out completely information
5 The system checks the entered information
6 The system reports successful saving
7 The system updates and adds categories to the database
6a The system reports invalid information and failed saving
- The system updates and adds categories to the database success
Table 4: UC - 3.0 Manage Product Information
Use case names Manage product information
Description Manager is responsible for managing foods, including: entering new foods; delete foods; update foods’ price on special days like holidays, anniversaries
Pre-conditions Product type information (in the list of products) has been declared in the product catalog
1 The administrator selects the function to enter musical instrument information
2 Management staff makes edits (add, delete, edit)
1 Manager enters food which will be edited and clicks “Edit”
2 System displays the information of the selected Food
3 Manager enters to set the food's image, name, price, choose category and click “Save” 4a If the information is incorrect, the manager updates it again 4b If the information is correct, then return to step 6 of “2.0 Create a new food”
1 Manager enters food which will be deleted and clicks “Delete”
2 System displays the information of the selected Food
3 Manager enters to delete food
4 System displays the message “Are you sure you want to delete?” 5a If you click “Yes”, System deletes the information of the food out of the list
5b If you click “No”, then return to step 2 of “2.0 Create a new food”.
Post- conditions - Managers update employee information labor
- The system updates employee information into the database success
Table 5: UC - 4.0 Manage Staff Information
Use case names Manage employee information
Description Managers manage employee lists including name, phone number, role
Pre-conditions Manager must have an account.
1 Management staff selects the function of managing personal information pellets
3 Management staff makes edits (add, delete, edit) staff information
1 Manager accesses the function "Staff"
2 System displays a list of restaurant’s staff
4 New staff are filled with information by Manager 5 Manager clicks
6 System saves and adds the information of the new staff to the list
1 Manager enters food which will be edited and clicks “Edit”
2 System displays the information of the selected Food
3 Manager enters to set the food's image, name, price, choose category and click “Save”.
4a If the information is incorrect, the manager updates it again 4b If the information is correct, then return to step 6 of “2.0 Create a new food”.
1 Manager enters food which will be deleted and clicks “Delete”
2 System displays the information of the selected Food
3 Manager enters to delete food
4 System displays the message “Are you sure you want to delete?” 5a If you click “Yes”, System deletes the information of the food out of
5b If you click “No”, then return to step 2 of “2.0 Create a new food”.
Post- conditions - Managers update employee information labor
- The system updates employee information into the database success
Use case names Create orders
Description Staff records the customer's booking information, including: Customer information, Foods information and Check-in date
Pre-conditions Staff must receive the information provided by the Customer.
Flow 1 Staff asks to view a list of available foods
2 System displays a list of available foods
3 Staff selects food from the list followed by customer’s requirements
4 System displays the information of order, including: price, total, amount, foods’ name, quantity.
5 When the order is finished, the system will confirm acceptance of the order
6 Staff will select function “KOT” to send order to Kitchen department
Post- conditions The status of the order food changes to "Waiting".
Use case names Confirm Payment
Description Employees are responsible for billing customers.
Pre-conditions - Customer requested payment of the bill
- Information of order is saved in the system.
- Payment voucher numbers are unique and do not overlap
Flow 1 Staff accesses the function "Bills”
2 System displays a list of orders
3 Staff chooses order to payment
4 System displays information of chosen order, including Total Payment
6 Staff completes the payment procedure
Post- conditions - Successfully created payment slip
- The system updates payment slips into the successful database labor
Table 8: UC - 7.0 Confirm status of orders
Use case names Confirm status of orders
Description Kitchen staff are in charge of confirming orders
Flow 1 System sends the information in order to the Kitchen department
2 Staff of Kitchen views orders
3 Orders will be completed when Staff of Kitchen finish foods
Post- conditions Orders must be completed
LOGICAL VIEW
Order Name Description Data Type Key
1 catID Category code int Primary
Order Name Description Data Type Key
1 pID Product code int Primary
Order Name Description Data Type Key
1 DetailID Detail code int Primary
Order Name Description Data Type Key
1 userID User code int Primary
4 uPhone User's phone number Varchar (20)
1 sID Staff code int Primary
3 sPhone Employee phone number Varchar (50)
Order Name Description Data Type Key
1 MainID Main code int Primary
Order Name Description Data Type Key
1 tID Table code int Primary
DATABASE DIAGRAM
ENTITY-RELATIONSHIP DIAGRAM
SEQUENCE DIAGRAM
ACTIVITY DIAGRAM
INFORMATION SECURITY
DEFINITION
Protecting all types of information, including customer, financial, legal, employee, system data, and business process information, is crucial for maintaining data integrity, preventing unauthorized access, and adhering to data security regulations This includes compliance with GDPR, where applicable, to avoid legal repercussions and preserve the restaurant's reputation By safeguarding sensitive data, restaurants can protect their operations, reduce the risk of breaches, and demonstrate a commitment to data security best practices.
Information security encompasses measures safeguarding data from unauthorized access, disclosure, or alteration during storage and transmission It encompasses principles such as confidentiality (ensuring data privacy), integrity (maintaining data accuracy), availability (ensuring access to data), consistency (aligning data across systems), authenticity (verifying data origins), and non-repudiation (preventing individuals from denying actions performed on data).
- Application Security: Application security seeks to protect computer programs and application programming interfaces (APIs) These programs depend on information that conforms to CIA guidelines to function properly, and InfoSec ensures this.
- Cloud Security: Cloud security aims to shield cloud assets from threats One of the primary concerns about InfoSec is whether it can protect cloud-based resources, particularly because the cloud is an increasingly important component of business operations.
- Infrastructure Security: Infrastructure security protects the physical assets that support a network These include servers, mobile devices, client devices, and data centers.
- Incidence Response: Information security management also involves responding to threats and breaches, such as phishing attacks, identity theft, malware incursions, and others.
Cryptography employs encryption techniques to safeguard data and communications, ensuring that only authorized persons with the proper decryption key can access and comprehend the encrypted information This prevents unauthorized individuals from gaining access and compromising the data's confidentiality and integrity.
Disaster recovery is a crucial aspect of information security as it ensures organizations have plans and resources to effectively recover from disruptive events By incorporating tools and methodologies focused on disaster readiness, information security enhances an organization's resilience in the face of both natural disasters and malicious cyberattacks, allowing them to minimize downtime and preserve critical data.
- Vulnerability Management: Every system has vulnerabilities, and InfoSec seeks to identify and limit them In this way, IT admins can limit exploitation and exfiltration.
SECURITY PROCESS
An information security process is a strategy or method designed to guide information security professionals in the performance of their duties There are certain requirements that must be met to protect an organization's information technology infrastructure Security procedures include:
- Identification of Critical Information: This step requires organizations to identify and clearly define the important and sensitive information they need to protect These types of information can include customer data, account information, accounting information, software source code, or any other data that has value to the organization.
- Analysis of Threats: This process involves identifying and evaluating potential threats that information may face Threats may include cyber-attacks, computer viruses, phishing, or other malicious activities that may compromise the integrity and security of information.
- Analysis of Vulnerabilities: In this process, organizations test and analyze vulnerabilities in their systems, processes, and infrastructure These vulnerabilities can be weaknesses in system security, such as out-of-date software, insecure configurations, or lack of employee knowledge.
- Assessment of Risks: After identifying threats and vulnerabilities, the organization conducts a risk assessment to determine the severity and probability of occurrence of the risks This helps them identify risks that need to be prioritized and addressed first.
- Application of Countermeasures: The final process involves implementing preventive measures to minimize or eliminate identified risks This includes implementing security measures, improving system configuration, training employees, and applying controls to ensure information security.
SOLUTION
To ensure the security of the information in your restaurant management system, you need to implement a comprehensive set of security measures By implementing these solutions, you can ensure that your restaurant management system will keep information safe and meet important security requirements Below is a list of specific solutions to protect important data and meet security requirements:
- Data Encryption: Apply encryption to critical data, including online communications and data in databases, to ensure confidentiality.
- Access Rights Management: Limit system access to essential users only and implement strong authentication measures such as MFA.
- Password Management: Require users to use strong passwords and change passwords periodically, along with secure password storage.
- Intrusion Monitoring and Detection: Use intrusion detection and monitoring systems to monitor unusual activity and detect intrusions.
- Employee Training: Ensure that employees are trained on security practices and how to safely handle important information.
- Data Backup and Recovery: Perform periodic backups of data to ensure integrity and have a data recovery plan in case of failure.
- Standards Compliance: Ensure that systems comply with security regulations and industry standards such as PCI DSS.
- Software and Security Updates: Periodically update software and systems to eliminate security vulnerabilities.
- Develop a Response and Recovery Plan: Develop a plan to respond promptly and recover from a security breach or incident.
- Evaluate and Improve: Continuously evaluate and improve security measures to ensure effectiveness and adapt to the changing security environment.
- Periodic Security Testing: Perform periodic security testing to ensure that systems and information remain effectively protected.
- Use information security technologies: Such as firewalls to protect the system by analyzing data packets to find signs of threats If a threat is detected, data is discarded before being allowed onto the network.
Our fast food restaurant management system employs a knowledge management system to effectively manage and provide comprehensive product and payment information This system utilizes a meticulously organized database to store and maintain product data, encompassing images, detailed descriptions, prices, specifications, and additional relevant information The structure of this database allows for seamless updates, ensuring the accuracy and accessibility of product information.
Product search and selection: Customers can search for products based on many criteria, such as product type, product name The knowledge management system helps create an easy-to-use search interface and fast.
Integration with payment systems: After the customer selects a product, the knowledge management system can link directly with the payment system to complete the transaction.
CHAPTER IV: APPLY IoT TO DESIGN AN AUTOMATIC FIRE ALARM SYSTEM
The restaurant operates in a building with many areas, including the kitchen, garage (parking space for customers and employees), and service counter While the restaurant is using a lot of heat and grease in the kitchen, there is a risk of fire not only in the kitchen but also in the entire restaurant To ensure the safety of employees, customers, and restaurant assets, our team has deployed an IoT system for early detection and fire warning throughout the restaurant.
Figure 20: Automatic fire alarm system
1 DECRIPTION OF AUTOMATIC FIRE ALARM SYSTEM
This system includes multiple devices and sensors that work together to automatically detect and alarm fires Below is a description of the main components of an automatic fire alarm system:
- Home Gateway (Family information portal): Home Gateway is the brain of the automatic fire alarm system It is the control center, managing and linking all devices in the system Home Gateway connects to fire sensors, sirens, sprinkler systems, and phones via a wired or wireless network connection It monitors the status of the devices and transmits warning information when there is a fire event.
- Siren: Siren is a device that emits a warning sound when there is a risk of fire. often placed in important locations in homes or buildings.
- Fire Sprinkler (Fire sprinkler system): A sprinkler is an automatic sprinkler system installed on ceilings or walls in fire hazard areas S
- Telephone: Telephone is an important part of the automatic fire alarm system to communicate with the user or fire organization The phone can be a cell
2 FUNCTION OF AUTOMATIC FIRE ALARM SYSTEM
- Detection of fire or fire hazard: Automatic fire alarm systems are designed to detect the presence of fire or signs of fire hazards such as toxic gasses, elevated temperatures, or smoke Fire and toxic gas sensors, heat detectors, difficulty sensors, etc.
- Identify risk: After the sensor detects the presence of fire or fire risk, the system will determine the level of risk and calculate whether it meets the required level of danger to be reported.
- Reporting and warning: If the system determines that there is a fire hazard situation, it will trigger warning measures Warnings may include sirens, audible announcements, or notifications to fire departments or users via network or telephone.
- Control of safety structures: Automatic fire alarm systems can be combined with other safety mechanisms such as automatic door closing, automatic fire extinguishing systems, and other safety measures to control and minimize fire risk
Figure 21: Fire alarm system in normal time
Figure 22: Fire alarm system when there is a risk of fire
- When the Gateway determines a fire risk, it will send a signal to the siren, and the siren will create a warning sound to warn residents of the fire risk situation. This helps people know about the fire situation and have time to evacuate safely.
In the event of a fire hazard, the Gateway is designed to activate the telephone system, initiating an automatic response It dials pre-programmed numbers or connects directly to a fire center, alerting the user or relevant organization to the critical situation This feature enables immediate notification and request for urgent assistance, facilitating a swift and coordinated response to fire threats.
- When the Gateway determines there is a fire risk, it can activate the corresponding sprinkler in the risk area Sprinklers will spray water to extinguish the fire and prevent it from spreading.
The interface of the fast food restaurant management software is straightforward, friendly, and easy to use, and it satisfies the requirements of restaurant service at peak times The program is appropriate for the majority of simple to complicated, small retail models to big chains, sales operations, and management demands.
It aids in enhancing professionalism and operational efficiency for food and beverage company models in addition to providing fundamental sales and management support features.
The program allows rigorous power delegation to staff members, makes it simple to follow order history, and reduces fraud and loss Detailed income figures from a variety of orders, coupons, and promotions used, as well as the total amount by each payment method, are all available when tracking revenue and spending activities.
To make business easier, strengthen ties with partners in ordering, delivery, electronic payments, and voucher issuing.
APPLY IoT TO DESIGN AN AUTOMATIC FIRE ALARM SYSTEM
KMS 36 CHAPTER VI: CONCLUSION xlvii
The fast food restaurant management system leverages a knowledge management system to manage and disseminate comprehensive product information This system maintains a structured and readily updatable database that includes high-quality images, detailed descriptions, pricing, technical specifications, and other relevant details for each menu item.
Product search and selection: Customers can search for products based on many criteria, such as product type, product name The knowledge management system helps create an easy-to-use search interface and fast.
Integration with payment systems: After the customer selects a product, the knowledge management system can link directly with the payment system to complete the transaction.
CHAPTER IV: APPLY IoT TO DESIGN AN AUTOMATIC FIRE ALARM SYSTEM
The restaurant operates in a building with many areas, including the kitchen, garage (parking space for customers and employees), and service counter While the restaurant is using a lot of heat and grease in the kitchen, there is a risk of fire not only in the kitchen but also in the entire restaurant To ensure the safety of employees, customers, and restaurant assets, our team has deployed an IoT system for early detection and fire warning throughout the restaurant.
Figure 20: Automatic fire alarm system
1 DECRIPTION OF AUTOMATIC FIRE ALARM SYSTEM
This system includes multiple devices and sensors that work together to automatically detect and alarm fires Below is a description of the main components of an automatic fire alarm system:
- Home Gateway (Family information portal): Home Gateway is the brain of the automatic fire alarm system It is the control center, managing and linking all devices in the system Home Gateway connects to fire sensors, sirens, sprinkler systems, and phones via a wired or wireless network connection It monitors the status of the devices and transmits warning information when there is a fire event.
- Siren: Siren is a device that emits a warning sound when there is a risk of fire. often placed in important locations in homes or buildings.
- Fire Sprinkler (Fire sprinkler system): A sprinkler is an automatic sprinkler system installed on ceilings or walls in fire hazard areas S
- Telephone: Telephone is an important part of the automatic fire alarm system to communicate with the user or fire organization The phone can be a cell
2 FUNCTION OF AUTOMATIC FIRE ALARM SYSTEM
- Detection of fire or fire hazard: Automatic fire alarm systems are designed to detect the presence of fire or signs of fire hazards such as toxic gasses, elevated temperatures, or smoke Fire and toxic gas sensors, heat detectors, difficulty sensors, etc.
- Identify risk: After the sensor detects the presence of fire or fire risk, the system will determine the level of risk and calculate whether it meets the required level of danger to be reported.
When a fire hazard is detected, the system triggers warning measures These warnings can include audio or visual signals, such as sirens or audible announcements In addition, the system may send notifications to fire departments or users through network or telephone connections, ensuring timely and effective response to potential fire threats.
- Control of safety structures: Automatic fire alarm systems can be combined with other safety mechanisms such as automatic door closing, automatic fire extinguishing systems, and other safety measures to control and minimize fire risk
Figure 21: Fire alarm system in normal time
Figure 22: Fire alarm system when there is a risk of fire
- When the Gateway determines a fire risk, it will send a signal to the siren, and the siren will create a warning sound to warn residents of the fire risk situation. This helps people know about the fire situation and have time to evacuate safely.
- When the Gateway identifies a fire hazard, it can activate the telephone system to notify the user or fire organization of the fire situation The phone can automatically call important numbers or connect to the fire center to request urgent help.
- When the Gateway determines there is a fire risk, it can activate the corresponding sprinkler in the risk area Sprinklers will spray water to extinguish the fire and prevent it from spreading.
The interface of the fast food restaurant management software is straightforward, friendly, and easy to use, and it satisfies the requirements of restaurant service at peak times The program is appropriate for the majority of simple to complicated, small retail models to big chains, sales operations, and management demands.
It aids in enhancing professionalism and operational efficiency for food and beverage company models in addition to providing fundamental sales and management support features.
The program allows rigorous power delegation to staff members, makes it simple to follow order history, and reduces fraud and loss Detailed income figures from a variety of orders, coupons, and promotions used, as well as the total amount by each payment method, are all available when tracking revenue and spending activities.
To make business easier, strengthen ties with partners in ordering, delivery, electronic payments, and voucher issuing.
Although a restaurant management system is a powerful tool that helps optimize restaurant management operations, minimize errors, and increase customer experience, it also comes with a series of limitations that restaurants need to overcome:
- Data security is an important issue in the field of restaurant management The management system contains customers' personal information, financial information, and important business data If not carefully secured, this information can be stolen or threatened by cyber attacks or human error.
- Customizing a restaurant management system to fit a restaurant's specific requirements can require a lot of time and resources.
- There is no integration of electronic payment gateways such as Momo, Zalopay, …
- Not compatible with mobile phones
- Some features are limited such as tracking shipping orders, and customer reviews,