\r\n
\r\nDownload Now>>","showSummary":null,"url":"/2017-tech-innovators","date":"2016-11-22T00:00:00","author":{"email":"devteam@ashday.com","uname":"ash_root","firstName":null,"lastName":null,"bio":null,"title":null,"picture":null,"phone":null,"contactForm":null},"digitalEdition":null,"sponsored":false,"taggedPro":null,"teaserImage":{"id":42942,"url":"https://assets1.risnews.com/styles/secondary_articles_short/s3/ris_TechInnovators17_1116_teaser.jpg?itok=qPVffukD","width":196,"height":216,"alt":""},"topics":[{"name":"Special Reports","url":"/special-reports"},{"name":"Network Infrastructure","url":"/network-infrastructure"},{"name":"Wi-Fi","url":"/wi-fi"},{"name":"Business Intelligence (BI)","url":"/business-intelligence"},{"name":"Cloud Computing","url":"/cloud-computing"},{"name":"Omnichannel","url":"/omnichannel"},{"name":"Customer Relationship Management (CRM)","url":"/customer-relationship-management-crm"},{"name":"Customer Service","url":"/customer-service"},{"name":"E-Commerce","url":"/e-commerce"},{"name":"Enterprise Resource Management","url":"/enterprise-resource-management"},{"name":"Human Resources","url":"/human-resources"},{"name":"Digital Transformation","url":"/digital-transformation"},{"name":"Inventory Management","url":"/inventory-management"},{"name":"IT Services","url":"/it-services"},{"name":"Loyalty Programs","url":"/loyalty-programs"},{"name":"Machine Learning","url":"/machine-learning"},{"name":"Merchandise Management","url":"/merchandise-management"},{"name":"Mobile Commerce","url":"/mobile-commerce"},{"name":"Marketing","url":"/marketing"},{"name":"Mobile Apps","url":"/mobile-apps"},{"name":"Social Networking","url":"/social-networking"},{"name":"Personalization","url":"/personalization"},{"name":"Point of Sale","url":"/point-sale"},{"name":"Store Operations","url":"/store-operations"},{"name":"Store Systems","url":"/store-systems"},{"name":"Supply Chain Management","url":"/supply-chain-management"},{"name":"Big Data","url":"/big-data"},{"name":"Mobile Strategy","url":"/mobile-strategy"},{"name":"Customer Experience","url":"/customer-experience"},{"name":"Internet of Things (IoT)","url":"/internet-of-things"},{"name":"Unified Commerce: RIS Deep Dive","url":"/ris-deep-dive-unified-commerce"}],"attachedFiles":[{"url":"https://eiqeditor.risnews.com/_flysystem/s3private/downloads/2017-11/Tech%20Innovators.pdf","id":18929,"description":""}]},{"title":"Grocery Retail Techscape: Dawn of the Digital Grocer","id":392,"bundle":"whitepaper","url":"/grocery-retail-techscape-dawn-digital-grocer","date":"2016-10-20T00:00:00","author":{"email":"devteam@ashday.com","uname":"ash_root","firstName":null,"lastName":null,"bio":null,"title":null,"picture":null,"phone":null,"contactForm":null},"summary":"
This deep-dive study benchmarks the grocery segment's commitment to digital transformation in such key areas as marketing, loyalty, online shopping, WiFi and more. Download to find out where grocers are ahead of the curve and where they clearly need to catch up.
","alternateLabel":"SPECIAL REPORT","teaserImage":{"id":24211,"url":"https://assets1.risnews.com/styles/secondary_articles_short/s3/1016grocerstudy.jpg?itok=0GB8c3ld","width":196,"alt":"","height":216},"sponsored":false,"businessTopic":[],"company":[],"contentType":[]},{"title":"Effective Security Goes Beyond Protecting Card Data","id":1400,"bundle":"article","summary":"The retail enterprise is under siege from all sides. While the high-profile POS data breach still gets the lion's share of attention, it is just one aspect of the cyber security war currently waging between retailers and digital criminals.","showSummary":null,"url":"/effective-security-goes-beyond-protecting-card-data","date":"2016-07-12T00:00:00","author":{"email":"devteam@ashday.com","uname":"ash_root","firstName":null,"lastName":null,"bio":null,"title":null,"picture":null,"phone":null,"contactForm":null},"digitalEdition":null,"sponsored":false,"taggedPro":null,"teaserImage":null,"topics":[{"name":"Wi-Fi","url":"/wi-fi"},{"name":"Omnichannel","url":"/omnichannel"},{"name":"Security","url":"/security"},{"name":"E-Commerce","url":"/e-commerce"},{"name":"Enterprise Resource Management","url":"/enterprise-resource-management"},{"name":"Network Infrastructure","url":"/network-infrastructure"},{"name":"Mobile Devices","url":"/mobile-devices"},{"name":"Point of Sale","url":"/point-sale"},{"name":"Mobile Commerce","url":"/mobile-commerce"},{"name":"Personalization","url":"/personalization"},{"name":"Store Systems","url":"/store-systems"},{"name":"Big Data","url":"/big-data"},{"name":"Mobile Strategy","url":"/mobile-strategy"},{"name":"Customer Experience","url":"/customer-experience"},{"name":"Wearables","url":"/wearables"},{"name":"Internet of Things (IoT)","url":"/internet-of-things"},{"name":"Mobile Wallet","url":"/mobile-wallet"},{"name":"July 2016 Issue","url":"/july-2016-issue"}],"attachedFiles":[]},{"title":"Security: It Goes Beyond the Breach","id":1418,"bundle":"whitepaper","url":"/security-it-goes-beyond-breach","date":"2016-07-11T00:00:00","author":{"email":"devteam@ashday.com","uname":"ash_root","firstName":null,"lastName":null,"bio":null,"title":null,"picture":null,"phone":null,"contactForm":null},"summary":"Every point of access is under attack. Retailers need to secure them all or risk becoming an opportunistic hacker’s next target.","body":"Threats to the retail enterprise lurk around every corner and retailers must be prepared to meet them head on. POS and WiFI security remains a major concern for retailers and an area of continued investment. Every point of access is under attack and retailers need to secure them all or risk becoming an opportunistic hacker’s next target.
","alternateLabel":"Special Report","teaserImage":{"id":24094,"url":"https://assets1.risnews.com/styles/secondary_articles_short/s3/risCS0716.jpg?itok=tAJyopGX","width":196,"alt":"","height":219},"sponsored":false,"businessTopic":[],"company":[],"contentType":[]},{"title":"Store Systems Retail Techscape: Digital Transformation Reinvents the Store","id":1457,"bundle":"whitepaper","url":"/store-systems-retail-techscape-digital-transformation-reinvents-store","date":"2016-06-17T00:00:00","author":{"email":"devteam@ashday.com","uname":"ash_root","firstName":null,"lastName":null,"bio":null,"title":null,"picture":null,"phone":null,"contactForm":null},"summary":"Download this RIS Retail Techscape, which takes a deep dive into competitive positioning and investment trends for checkout and store systems broken out by technology, retail segment and revenue categories.","body":"Download this RIS Retail Techscape to get a detailed look at Checkout and Store Systems so that you can benchmark where your company sits on the digital transformation spectrum. Competitive positioning and investment trends are broken out by technology, retail segment and revenue categories.
","alternateLabel":"Research","teaserImage":{"id":24069,"url":"https://assets1.risnews.com/styles/secondary_articles_short/s3/ris_Techscape_OneView_0616_teaser.jpg?itok=wTSJLCLJ","width":196,"alt":"","height":216},"sponsored":false,"businessTopic":[],"company":[],"contentType":[]},{"title":"The Top Security Challenges Facing Retailers","id":1687,"bundle":"article","summary":"Find out the top three vulnerabilities that retailers should be aware of to safeguard their business and protect customers from threats.