Monday, August 27, 2012

New IBM SurePOS™ 700


Retailers need smarter store solutions.  The award-winning, energy-efficient SurePOS™ 700 is IBM’s most powerful point-of-sale system, delivering maximum performance, service-ability, energy efficiency and adaptability to drive today’s smarter store solutions.  When combined with industry-leading IBM software, system and data integration and management the latest SurePOS 700 models take IBM Smarter Store Solutions to new levels of power in transforming the point of sale to a cross-channel point of service.  Innovative, retail-optimized technology makes the SurePOS 700 more valuable to retailers than ever before.  With next generation Intel Core i3 processing as an option, scalable memory choices up to 8 GB, and hard disk or solid state drives options, the SurePOS 700 packs 10 percent to 50 percent more performance power, faster processing and extra storage capacity to drive the most demanding consumer service and enterprise applications.  High speed networking enables consumers and employees to rapidly access cross-channel offerings.  Support for dual video displays with superior graphics helps deliver an engaging, interactive customer experience.

Increased efficiency and reliability means fast ROI and more profit.  Checkout lanes that can be put into service in a matter of seconds help lower employee costs and satisfy shoppers who, too often, abandon their purchases rather than wait in line.  The IBM SurePOS 700, with easy-to-wake deep sleep, enables stores to provide customer service on demand, saving up to 47 percent in energy and optimizing staff time.  IBM Light-Path Management visual indicators on the front panel of the SurePOS signal potential system failures and allow easy diagnosis and correction before problems occur, keeping business moving.  Remote monitoring of environmental variables enables proactive servicing and maintenance.  Retail-hardening helps insure systems provide reliable service in the most harsh and rigorous store locations.  The open standards platform reduces the complexity of system integration with new and legacy systems, and the virtually tool-free design helps lower service costs.

The IBM SurePOS 700 offers a new low profile, distributed cover that increases opportunities for store placement while promoting energy efficiency and easy maintenance.  Built to accommodate performance enhancements that might result in overheating, discreet air vents on the bezel allow front-to-back airflow and eliminate the need for side vents, providing flexibility in placing the system under counters or tight spaces in the store.  Models are also available in distributed and integrated configurations with traditional covers.  Virtually tool-free, secure and easy front access to internal components maximizes uptime and usability.  Additionally a service lifecycle of up to seven years and highly scalable technology that integrates with legacy systems helps retailers get maximum use of their SurePOS 700 now and into the future. 

Tuesday, August 21, 2012

Who Has the Keys to Your Business?

Who has access to your business systems and what do they have access to?

This is hopefully an easy question to answer.  If not, then you have an exposure in your company that needs to be addressed quickly.  Controlling the specific authorized access to all end users of the systems that run a business is an important principle that needs constant maintenance and monitoring.

Access control is defined as a system which enables an authority to control access to areas and resources in a given physical facility or computer-based information system.  This conveys two important points: first, systems need to be physically secured and second, they need to be electronically secured.  Simple measures such as locking the office door and only providing authorized people with a key is a good start.  The next step is implementing a simple plan and responsible persons to manage and maintain all end user credentials and authorizations to meet some basic goals:

1) Develop role-based access levels - what roles need to perform what system tasks.

2) Create unique credentials for each user assigned to a role - no log in sharing!

3) Encourage users to use best practices for password protection: 

Always use strong passwords. For more information, search "strong passwords" on the Internet.

If passwords must be written down on a piece of paper, store the paper in a secure place and destroy it when it is no longer needed.

Never share passwords with anyone!  Use different passwords for all user accounts.
 
Change passwords immediately if they may have been compromised.

Be careful about where passwords are saved on computers.  Some dialog boxes, such as those for remote access and other telephone connections, present an option to save or remember a password.  Selecting this option poses a potential security threat.

4) Remove credentials for any employees leaving employ immediately.

5) Review user access roles routinely and keep updated appropriately.

Instituting and following these best practices will help secure your business systems, minimizing exposure to issues related to unauthorized access.  Be proactive and make sure you have these measures in place before you wish you had.  Remember these are the keys to your business.

Monday, August 13, 2012

Three Strategies for Loyalty

In today’s economy, retailers face a type of change that is uncommon.  We are at the verge of a historic moment of financial, technological and social changes that are reshaping the entire industry.  The challenges are daunting but the opportunities are tantalizing.  However, the key to success is not always clear.  While there is no guaranteed method to success, here are three key strategies that will help retailers gain a competitive edge.

The first strategy is giving reward.  Give your customers a thank you.  In exchange, you could gain insights into what they value as consumers.  This is also known as a "hard benefit."

The second strategy is to give recognition. In addition to issuing a loyalty card and giving loyalty discounts, you recognize your valued customers with gestures that go beyond the dollars and cents.  This could be complimentary upgrades, preferred booking status or front-of-the-line access to special events.  This is known as a "soft benefit."  Today's "best customers" have a higher expectation of recognition, and they have come to expect to be acknowledged for their continued loyalty.

The third strategy is what most major retailers are working to gain - relevance.  As traditional means of communication are increasingly replaced by mediums like social media and mobile, connecting with the consumer has become a challenging task.  Today’s consumers are bombarded by competing messages in every form possible from market competitors.  The challenge is to reach out to consumers with information that pertains to their needs.

These three strategies may seem simple and many retailers are already implementing them.  Again, the key to success is to “listen” to your customers and measure their satisfaction beyond the “hard benefits”.  This could be achieved with a well-designed customer feedback system and the incorporation of mobile and social media to create a customized shopping experience for each consumer.  This will allow each consumer to create what’s important to them and allow the retailers to fulfill their needs and beyond.

Tuesday, August 7, 2012

Foster a Positive Work Environment

Have you ever been in a situation where you felt like your work was going unnoticed?  If so you are with the majority of employees.  This can lead to a state of melancholy and lower production costing the company time and money.  This problem can in part be rectified with a little gratitude and positive feedback.  If you put more emphasis on leading by positivity and gratitude you can improve work output, employee attitude, and confidence.

Below are five ways you can foster a more positive work environment.

Combine gratitude and feedback. Try providing employees with specific feedback.  This can be a great teaching tool as well as a motivator and will build trust with your employees.

Be specific and authentic. When you give feedback make sure that it is genuine and true.  Try thanking the employee for staying late when asked or getting that special project completed on time.

Give routine compliments. The more you give positive feedback the better.  Employees are always open to receiving a “job well done” or “thanks for all your hard work”.  However, be careful not to overdue the compliments as you run the risk of sounding insincere.

Make gratitude either intimate or public (but not casual). Sometimes it is not enough to just give the causal “thank you”.  Try talking to an employee one on one or in front of the team as a whole.  This not only will give the employee great feedback but will show the team that you care.

Leave notes. A hand written note can go a long way with employees and bosses alike.  E-mails and text messages can be used but are not as intimate.

It is essential to also point out where an employee may need to improve.  If you are going to do this make sure there are some real positives highlighted as well.