POS Executive Commentary
-
Top 5 Issues To Consider Before Customizing Technology
7/15/2016
Customization used to be a bad word to many business owners. It was viewed as encumbering higher costs and depending on complex IT infrastructure. However, with the availability of more outsourced technology resources and the increased drive for innovation and marketplace gains, customization is becoming a more common business practice. By Kristen McAlister, President, Cerius Executives
-
Channel Partners Chasing Profitability Due To Lack Of Product Support
7/14/2016
Cloud sales have skyrocketed in recent years, but if the Software-as-a-Service (SaaS) industry expects to hit Forbes’ projected $67 billion by 2018, someone needs to address a very significant user abandonment problem. By Dave Hauser, General Manager, Cloud and Managed Services, PlumChoice
-
How VARs Can Help Merchants Overcome Tokenization Confusion
7/12/2016
Even though tokenization was introduced to the payments industry more than a decade ago and has since become an industry mainstay, there is no agreed-upon protocol about how tokenization should be deployed or even what defines a token. By J.D. Oder II, CTO and SVP R&D, Shift4
-
ISV And VAR Valuations Are Rising With Payments Integration
7/8/2016
Payments processors and service providers aren’t the only ones benefiting from rising valuations in today’s massive convergence of technology, banking, and payments. Though the payments industry has successfully leveraged synergistic value from the acquisitions of, and/or strategic partnerships with ISVs and VARs, there has been a similar effect evidenced on the other side of the equation as well.
-
5 Habits Of The Most Successful VARs
7/7/2016
Habits — they either make you or break you, especially in the world of Value Added Resellers (VARs). In this article, we’ve outlined five habits of the most successful VARs as they have these down to a science. And to prove it, we’ve asked our top TouchBistro POS reseller, Wendell Au, to weigh in on how living and breathing these habits has helped pave his way to success.
-
Production Schedule Disruptions: Coping With Customer Changes
5/23/2016
Modern manufacturing is a sophisticated interplay of processes requiring a complex blend of machines, materials, and other resources. It’s easy for manufacturing operations to get disrupted by a variety of unforeseen influences such as equipment breakdowns, human resource issues, raw material shortages, unplanned demand changes, and a host of other challenges.
-
The Lifecycle Of Fraud — A Dynamic Solution
5/19/2016
It is scary to think some fraud prevention methods still rely on personally identifiable information (PII) as the sole means of combating e-commerce fraud. In a world riddled with data breaches, this form of static identity assessment and authentication is not only antiquated, but will soon be extinct.
-
Understanding How Technology Deployment Impacts The POS System
5/13/2016
Despite the Cloud’s obvious advantages, retailers should remember how much technology still needs thoughtful deployment and ongoing support in the store.
-
4 Ways Retail Technology Can Take Your POS Customers Where They Need To Be
5/11/2016
As a point of sale (POS) reseller, you work with clients that have different perspectives when it comes to retail technology. Chances are you could characterize some of them as merchants who recognize technology as a valuable tool that helps them stay competitive and profitable. Others, though, are still hanging on to legacy systems that could be crippling their ability to attain the productivity, efficiency, and level of customer service they need to survive.
-
Rising Security Priorities: 5 Security Trends To Watch
5/5/2016
Over the past eight years major IT industry shifts have demanded attention and budget. Hot topics that have dominated the IT conversation have included unstructured data governance, network monitoring, threat detection, virtualization, new cost-effective approaches to infrastructure management, and backup and disaster recovery solutions that help restore sensitive information in case of data loss or theft. These topics have changed the way IT manages and protects their environment, but even more where they place their resources and time.