Case Study

How We Fixed a Broken Jewellery Business System by Moving to Client-Server Architecture

From the desk of Sudarshana — 25+ years in the jewellery industry

Sudarshana — Founder, Jwellex & Nextcode Solutioons Pvt Ltds

25+ years of direct experience in the jewellery industry. This case study documents a real system I encountered at a jewellery company, the problems it caused, and the complete redesign I implemented that restored data integrity and operational control.

The Situation: A Large Jewellery Company Running on Chaos

I was brought in to consult on a large jewellery company that was struggling with a fundamental problem: management could not trust their own data. Reports showed figures that contradicted what staff were saying. Stock counts did not match what the system said. Financial summaries were inconsistent from one day to the next. The company was large, the operation was complex, and nobody really knew what was happening.

When I examined the system, the cause became immediately clear.

The root cause: The company was running on a file-server system where staff across multiple departments could open the database directly and edit records. There were no controls on who could change what, no transaction workflow, no rollback restrictions and no enforced end-of-day balancing. Data was being edited manually at the database level, bypassing any application logic entirely.

How a File-Server System Destroys Data Integrity

A file-server system works by placing shared files — including the database — on a central server that multiple users access directly over a network. This was a common architecture in older systems. The fundamental problem is that it treats the database as a shared file rather than a controlled service.

In this company, the practical consequences were severe:

  • Direct database editing. Staff with access to the file server could open the database with standard tools and change any record directly — without any application layer, without any audit trail, without any workflow enforcement. A cashier could change a transaction total. A store keeper could adjust stock figures. Anyone could alter anything.
  • No transaction control. Because there was no application enforcing workflow, transactions were not completed as atomic units. A partial entry — deducting from one account but not crediting another — could be abandoned mid-way, leaving the database in an inconsistent state.
  • No rollback restrictions. Staff could open records from weeks or months ago and change them. There was nothing to prevent backdated alterations that made current figures look correct while hiding past discrepancies.
  • No end-of-day balancing enforcement. Because there was no system enforcing daily close procedures, cashiers and store keepers accumulated unresolved discrepancies that grew larger over time.
  • Data that could not be trusted. The end result was that management had reports generated from data that had been manually edited by multiple people with no control, no log and no accountability. The reports were numbers. They were not facts.

The Redesign: Department-Based Client-Server Architecture

The solution was a complete architectural replacement. Instead of a shared file that anyone could edit, I implemented a proper client-server system where all database access goes through an application layer that enforces rules, controls and workflows.

The key design principles were:

1. Department-Level Role Separation

Each department could only perform the transactions relevant to their function. No department had access to another department's data entry functions.

Cashiers
Process sales, accept payments, issue receipts
— cannot touch stock or purchasing
Store Keepers
Receive stock, process dispatches, manage inventory
— cannot touch cash or sales
Purchasing
Raise purchase orders, confirm deliveries
— cannot touch cash or retail stock
Accounts
View financial reports, process month-end
— read-only on operational data
Management
Full MIS, reports, authorisation of overrides
— authorise but not directly edit

2. Restricted Rollback Policy

One of the most important changes was restricting how far back anyone could modify data. In the old system, records from any date could be changed at any time. In the new system, rollback was restricted to the current business day only.

If a cashier made an error on today's transactions, they could correct it today. Once the day was closed, those records were locked. No retrospective editing of past days' data was permitted through the application. This single change had an enormous impact on data reliability — because it meant that once a day was closed and balanced, those figures were permanent.

3. Mandatory Same-Day Balancing

The system enforced that cashiers had to balance their cash at the end of each day before the day could be closed. Stock keepers had to balance their stock receipts and dispatches. Neither could leave the system open into the next day with unresolved entries.

This changed behaviour fundamentally. Previously, discrepancies could be ignored because there was no system enforcing resolution. Under the new system, an unbalanced day meant the day could not be closed, which meant the next day could not start with clean books. The social and operational pressure to balance became immediate and daily rather than theoretical and monthly.

The key insight: The old system assumed that staff would behave correctly if given access. The new system was designed around the reality that any system which permits incorrect behaviour will eventually see it — whether from negligence, error, or deliberate fraud. The architecture had to make correct behaviour the only available path.

Once data cannot be edited retrospectively, once each department can only do their own job, and once daily balancing is enforced rather than optional, the system produces data that management can actually rely on.

The Transition: What Implementation Required

Replacing a system that staff had been using — however badly — with a new one that imposed real controls required careful management of the people side as much as the technical side.

Staff who had been editing data directly resisted the new controls. The immediate complaint was that the system was "inflexible" and "didn't let them do their job." This is a common response when controls are imposed on people who have become accustomed to operating without them. The response was consistent: the flexibility they were asking for was the freedom to produce unreliable data. That freedom was not available in the new system.

The transition required approximately six weeks of parallel running — old system and new system simultaneously — before the old system was switched off. During that period, every discrepancy between the two systems was investigated and resolved. By the end, management had confidence in the new system's data and the parallel running ended.

Outcomes After Implementation

1

Data integrity was restored. Reports from the new system reflected actual business activity because no record could be edited outside of its proper workflow.

2

Fraud became measurably more difficult. With department isolation and rollback restrictions, the mechanisms that had allowed undetected manipulation were removed.

3

Daily balancing created immediate accountability. Cashiers and store keepers could not carry unresolved discrepancies forward. Problems surfaced the same day they occurred.

4

Management could rely on their reports for the first time. Decision-making improved because the underlying data was trustworthy.

5

The system operated reliably for years after implementation without the data integrity issues that had plagued the previous system.

The Principle That Drives Jwellex Design

This experience — and several others like it over 25+ years — shaped how Jwellex was designed from the ground up. Every feature in Jwellex is built around the principle that correct behaviour should be the only available path, not an optional one.

Cancellations require manager authorisation. Rollbacks are restricted and logged. Departments see only what they need. Every action is recorded in an immutable audit trail. Daily cash balancing is enforced at the counter level. Stock movements require a formal transaction record.

These are not arbitrary restrictions. They are the controls that make the difference between data management can trust and numbers that look right but mean nothing.

Key Takeaways for Jewellery Business Owners

  • If your staff can edit historical records, your data cannot be trusted — regardless of whether they actually do
  • Department isolation is not bureaucracy. It is the minimum control needed to know who is responsible for what
  • Daily balancing enforcement converts a theoretical requirement into an operational reality. Optional balancing does not produce reliable data
  • Resistance to system controls from staff is normal and expected — and is often the strongest signal that those controls are needed
  • A system that permits incorrect behaviour will see it. Architecture that enforces correct behaviour produces trustworthy data
See Jwellex Fraud Prevention Controls ›   |   Previous Case Study: Multi-Branch Architecture ›

See These Controls in Jwellex

Request a demo and we will walk you through the audit trail, role-based access and balancing controls that Jwellex enforces by design.
SEE THE CONTROLS TALK TO OUR TEAM

+94 717 257 720  |  help@jwellex.com