ISV/Software Developer Magazine Articles
-
Payment Trends You Can Take To The Bank
10/13/2015
These experts share how retail solutions providers can capitalize on the hottest payments trends in 2016.
-
Want Recurring Cloud Revenue? Develop A Killer App
9/15/2015
This small MSP-turned-ISV is projecting more than $1 million in revenue growth this year with even bigger growth potential the following year.
-
Dividing And Conquering The Hospitality Market
9/15/2015
With a redesigned sales strategy and an eye to the cloud, the ISV behind 2TouchPOS is achieving steady double-digit growth.
-
ISVs Have New Events Just For Them
9/15/2015
Little-known fact: More than one in four Business Solutions readers have indicated during the subscription process that they have a software development component to their business.
-
4 Technologies Every Restaurant IT VAR Should Be Selling
8/14/2015
Learn why mobile technologies, fixed tablets, and digital signage should be a significant part of your business plan.
-
Cash In On Stand-Alone Bar Code Printing
8/13/2015
A systems integrator creates a stand-alone printing app that leads to printer sales and six-digit recurring revenue from consumables.
-
Create Unique Printing Applications For Specialty Retail
8/13/2015
This solutions provider created a custom shelf labeling system that can now be sold to its grocery customers.
-
ISV Attracts Big Business With Consolidated Cloud Applications
8/13/2015
By consolidating several business applications into one subscription-based software package, this integrator is cornering the market in its vertical.
-
Think Beyond Traditional POS
6/16/2015
An ISV’s solution helps restaurants address key challenges, while creating a lucrative differentiator for the solutions provider.
-
The Best Security Defense Is Strong Offense With EMV, P2PE + Tokenization
5/18/2015
While the payments landscape has become more complex (e.g. NFC, mobile, wearables), cyber thieves have become more tech savvy. In response, EMV, P2PE and tokenization have become effective solutions to thwart security risks. However, there is a lack of awareness on why there is value in relying on all three technologies, and not just one or two of these technologies alone.