Top Stories



Target’s Image Recognition App Is Limited To The Point Of Absurdity

July 22nd, 2014
Target on Monday (July 21) rolled out an image-recognition mobile app called In a Snap, an effort that simultaneously merits applause for its innovation and boos for its stunningly limited scope. A true image-recognition app would be trained to look for a huge number of items that would be available from Target and to spot them in the physical world, in any news photo, ad or posted Web image. If a shopper (guest, in Target parlance) is admiring a Reuters news photo of a celebrity wearing a gown that the shopper likes, it could recognize that image and offer up whatever Target has that is closest. Amazon and others have experimented with similar efforts (consider Amazon's Mechanical Turk project) and Google's image recognition function within its search engine and Google Glass has also kicked those virtual tires.

Target's description of In a Snap on its own site implies a similar effort: "Have you ever flipped through a magazine or catalog and fell in love with a product — a rug, chair, lamp, whatever — and wanted to buy or bookmark it immediately? Yeah, us too. That desire for instant access to inspiring product is the idea behind Target’s latest mobile app, In a Snap. Compatible with the iPhone, iPad and iPod, the new image recognition app lets you easily shop Target items directly off the pages of magazines and printed ads — without having to scan confusing codes, look up links or search for product online or in store." Sounds good, but the app itself doesn't come close to delivering. It doesn't try to recognize images. It's solely designed to recognize a handful of specific Target ads—ads that are labeled as being compliant with this app. Despite its claim that it can deliver "without having to scan confusing codes," I'm struggling with seeing how this is any better for its shoppers or for Target. For both code-scanning (even the much-maligned QR codes) and In a Snap, the shopper must download an app, launch that app and point the phone at the ad. The only difference is that a QR code reader can be used for a huge number of applications, whereas the Target app is limited to ads from Target--and a very small percentage of even Target ads.Read more...


Escape From The Wearables World, IT Edition

July 21st, 2014
As wearables get more sophisticated and integrated into our physical environments, virtual environments and entering the sacrosanct enterprise data stream, they certainly promise wonderful advantages. But as any other IT veteran knows, never look a corporate gift horse in the mouth without first performing security penetration testing. (The enterprise IT motto: Trust and get fired.)

What brings these happy thoughts to the surface was an interesting piece in Wired yesterday (July 21) about a wearable vendor's efforts to focus on context in making its device more valuable. It's a terrific goal, but the more IT allows these devices to access, collect and manipulate sensitive data, the more valuable those databases will be to cyberthieves and corporate spies for your direct rivals. In IT, greater convenience often means greater risk, something vendor slides somehow always forget. I am not suggesting a sci-fi plot where these devices learn all about us and then take over the planet and make humans into their slaves. (Dawn of the Wearable World? The Wearables War?) But a few security limits wouldn't be out of line.Read more...


Mobile Payment Is The Only Reasonable Answer To These EMV Kumbayah Songs We’re Hearing

February 5th, 2014
One of the most hyped aspects of mobile is the potential for mobile payment to radically update the payment space, the first true change in payment in many decades. Those efforts have gone essentially nowhere, with the exception of Starbucks (which doesn't really do mobile payment, in that it's simply a picture of the barcode from the back of the Starbucks stored-value card).

Recent large-scale data breaches—specifically Target and Neiman Marcus—have brought new attention to the issue of the U.S. shifting to EMV (often deployed as Chip and PIN), a payment approach that replaces the magnetic strip with a chip and is has been deployed for years in much of Europe as well as Canada and Mexico. The arguments in favor of EMV—as opposed to mobile—are unrealistic, as became clear during U.S. Senate testimony on Tuesday (Feb. 4). Given EMV's struggles, mobile payment is now becoming crucial. Can the industry get its act together? (Answer: Of course it can't, but let's be hopeful and pretend that the adults will take over.)Read more...


As Amazon, Apple Look To Get Into In-Store Payments, Amazon Has The Weaker Hand. Why? Because Retailers Really Hate Amazon

February 4th, 2014
Recent reports have both Amazon and Apple exploring ways to bring their version of mobile payments into brick-and-mortars (beyond Apple stores, of course). If these two players are hunting to get into the largest retail chains, Apple has several huge advantages.

But if mom-and-pop retailers are the intended quarry, then the advantage (especially in non-urban geographies where iPhones and iPads are not nearly as dominant) goes to Amazon. First, what are the rumors? The Wall Street Journal has been out-in-front on both stories. On the Apple front, the paper describes the play as letting shoppers use their personal Apple mobile devices to make the purchases, with Apple leveraging "the hundreds of millions of credit cards on file through its iTunes stores."Read more...


Quick Breach Quiz: What Do Target And Starbucks Have In Common?

February 4th, 2014
Quick breach quiz: What do Target and Starbucks have in common? Both recently suffered well-publicized security problems that were caused by third-party software. How well do you know everything that every piece of third-party software is doing on your system?

Let's take a quick look at the latest reports of how the Target situation materialized. Target is now saying that the cyberthieves "stole a vendor's credentials, which were used to access our system," but the chain didn't say which vendor was involved. A few suspected vendor systems have emerged. The Wall Street Journal has reported that Target "shut down remote access to two websites used by employees and suppliers in a move to tighten security following a massive breach of customer data over the holidays. One system is a human resources website for employees called eHR. The other is a database called Info Retriever that suppliers use to access sales data for their products in Target."Read more...

Want To Convince Your People To Move In A New Direction? Study How Starbucks Has Done It

January 13th, 2014
Business would be so much easier if executives didn't have to deal with human beings, with fears, hesitations and general avoidance of anything new. It makes little difference if those human beings are employees and you're trying to push an aggressive cloud program or if those mammals are customers and you're trying to get them to move to mobile or some form of biometric identification. If you're struggling with pushing these behavioral changes, you might have an unlikely company to emulate: Starbucks, which seems to have mastered how these humans think and has consistently used a go-slow (make that extremely slow) approach.

A campaign unveiled by the coffee bean behemoth last week illustrates the latest example of this decaffeinated strategy. Starbucks is considered the most successful U.S. retailer when it comes to handling mobile payments and, for that matter, mobile anything. When the holiday shopping season for 2013 came around, the normal reaction for most retailers would be to push its mobile app and encourage shoppers to load dollars onto the mobile app of intended gift recipients. Instead, Starbucks deliberately chose to not push mobile at all, but to instead encourage the purchase of old-fashioned plastic Starbucks cards, the kind that fit neatly into holiday stockings.Read more...

What To Include In Your Mobile Privacy Policy

January 7th, 2014
It's well known that mobile devices are compact storehouses of vast amounts of data that they seem eager to broadcast to the world, which makes it all the more baffling that few companies have discussed -- much less implemented -- mobile-specific privacy policies. Putting off such a move ("procrastination" is such a negative word) may have made sense up to now to give us all time to get a handle on what the limits should be, but you really will regret waiting much longer. This new year we have entered may be a good time to craft a mobile privacy policy. If you've decided to do that, here are some things to consider.

You do really need a policy. Your employees expect IT to protect them, and your company's executives expect you to make sure that corporate data is protected from the things that employees do with their mobile devices. But your customers also want to know what you're doing with their data, and various contractors, distributors, suppliers and anyone else in your network need to know what they aren't allowed to do.Read more...

2014: Time To Rethink Privacy

January 7th, 2014
In 2014, IT executives are going to have to make some very difficult decisions about privacy. Quite often when we talk about difficult decisions, we mean that we know what the right thing to do is, but it's just hard to bring ourselves to do it. In this case, though, part of the difficulty will be knowing what the right thing to do is. For that reason, every industry -- nay, every company -- will come to very different decisions based on the concerns of their employees and customers.

Of course, some companies have to face their privacy demons more than others. Yes, I'm looking at you, Google. Not that Google is likely to ever change how it handles privacy issues. (SAT time: Google is to privacy as (A) Osama bin Laden is to peaceful negotiations, (B) Lady Gaga is to rational thought or (C) Microsoft is to customer-centric. Answer: (D) all of the above.) The reason I'm looking at Google is that it just displayed privacy ineptitude on an epic scale.Read more...

The Target Thieves Find Yet Another Advantage To Attacking On Black Friday

December 26th, 2013
When the Target cyberthieves hit the chain in late November, they might have simply thought it would be a good time to steal a lot of money. But it also delivered another benefit: banks are simply too scared about losing any holiday revenue to implement standard security procedures. It appears to be the ultimate in a security calculated risk.

When a credit or debit card number is accessed by thieves, typical procedure for quite a few years has been to shut down the impacted cards and immediately re-issue the cards to those customers. This process means the customer will be without that card for anywhere from 2 days to sometimes a week. Thieves count on this, which is why they stage such massive attacks. They know that once it's discovered, they may have as little as an hour or two before the card data becomes worthless. That's why they try and monetize the stolen data—usually by making ATM withdrawals and retail purchases quickly, using lots of accomplices making simultaneous purchases/withdrawals.Read more...

Instagram Direct: A Clever Way To Direct A Lot More Consumer Data To Marketers

December 17th, 2013
In an interesting marketing play, Instagram on Thursday (Dec. 12) announced that it would offer a new service—to be called Instagram Direct—where its users could send messages and images to small subsets of their friends and families. At the news conference, Instagram CEO Kevin Systrom tied the rollout to the holiday, saying "As we as we enter into the holidays, it's a perfect time to be able to share with a small group or someone you love." That's true, as long as the someone you love includes marketers who will getting quite a Santa sack full of personal information about you and your friends.

The dirty not-so-secret secret with all of these social programs is it's always been about how much data can be collected from consumers, to be turned around and used to send increasingly personalized sales pitches. (Kind of gives Secret Santa a whole new meaning.) The two motherloads of shopping data are not-coincidentally both involved in this Instagram deal: photographs (and their associated metadata) and relationship connections. Why relationship connections? If you're a consumer goods manufacturer (think Toyota, Nike, Nabisco, Sony), a retailer (think Walmart, Macy's, Target, Amazon) or a marketing firm (think Genghis Kahn, Idi Amin, Mussolini), how much is it worth to you to know which consumers are close friends or close relatives with other specific consumers? As a major gift-giving occasion comes up for the first consumer, how would you like to be able to send highly-customized pitches to those people who are close friends/relatives of that consumer?Read more...

Why Is Tim Horton Embracing NFC? It Illustrates Why NFC For Payments Is Dead In The U.S..

December 16th, 2013
To be nice, it's fair to say that Near Field Communication (NFC) has hardly been a smash when it comes to mobile payments in the U.S.. But the key reason it's gone nowhere is not it's technical hurdles—although those tech hurdles are many—and it's not been a lack of household name retailers backing it.

Even mild-mannered Tesco—the world's second most-profitable retailer and the third-largest by revenue—couldn't resist stomping on NFC. The cause of NFC's U.S. mobile payment death has been a lack of incentives for shoppers to use it. Most critically, it simply wasn't any easier to use than regular magstripe swipes and it required a change of behavior.

That's why it was genuinely surprising when $3 billion Canadian and U.S. restaurant chain Tim Hortons announced Dec. 12 that it was beginning a mobile payment rollout using NFC. That overshadowed the almost-as-surprising detail that they were launching it solely on BlackBerry. Say what you will about Blackberry users, but if they're still using Blackberries in 2014, they certainly don't crave the latest cutting-edge gadget. So why is this 4,350-restaurant chain (including 817 stores in the U.S.) embracing NFC for payment? The reason actually reinforces why the technology has cratered in the U.S..Read more...

Mobile Is Changing So Many Enterprise Decisions—Even In A Store’s Dressing Room

November 26th, 2013
The penetration of mobile into so many unexpected parts of business is forcing quite a few new ways of IT thinking. Consider the retailer's dressing/changing room. Under the guise of theft-prevention, many are now scanning every piece of clothing that a shopper brings into the room, along with the identification being beamed from that customer's mobile device. Instant CRM, with details of every purchase being considered by that mobile tied in with them by name, automatically captured.

That mobile device will typically be a customer's smartphone. But the next step is where where an interesting debate is emerging. When the shopper leaves that dressing room and chooses to purchase only one—or perhaps even none—of the garments/accessories, at least one chain is now experimenting using a different mobile device (tablet) to try and get an answer to "Why?" In marketing circles, understanding why a customer opted to not purchase six items can be even more valuable than knowing why they purchased the seventh.Read more...

How Much Is A Mobile Picture Worth? A Lot More Than You Might Think

November 20th, 2013
The cliché dictates that a picture is worth 1,000 words, but if it's a mobile picture from a customer/prospect and you're a CIO or CMO, it's worth a heck of a lot more. Several vendors, well aware of many mobile device owners' love of taking digital photos of anything and everything (including selfies, which to me have always suffered from a major lack of raison d'être), actively encouraging these shoots, hoping to lasso in a goldmine of data. The pitch to shoppers is simple: if you see anything you'd like to buy, take a picture of it and we'll quickly identify it, through software and crowdsourcing.

Whether or not those identifications will work or not—and whether there are much easier and more accurate ways for those products to be identified—is something I'll get to shortly. But the goal here is all data. First, the images are being shipped through a mobile app, so everything is being associated with a specific identified shopper. (Hello, CRM database.) Secondly, the images usually come with exact geolocation data (Seems that you took this picture in the housewares section of our direct rival on Elm Street. Good to know) plus date/time.Read more...

In Its Latest Mobile Ploy, Starbucks Finds Out How Many Hoops Customers Will Jump Through For $5

October 31st, 2013
For years, Starbucks has been the best retailer when dealing with mobile payment. Mostly, that's been because their efforts are barely mobile payment at all, but instead is just the phone displaying a picture of the barcode from the customer's Starbucks plastic card. Low-tech perhaps, but it's worked wonderfully. Now the chain is trying something new, a way to use Twitter to send $5 gift certificates. But it's effort is so needlessly convoluted that it is making itself an excellent example of what not to do in mobile, when the program is designed for customers or employees.

Here's what Starbucks is doing with its Twitter effort dubbed Tweet-A-Coffee, according to a recap of some panel comments reported in Mobile Commerce Daily. "To send a gift card, consumers sync their Starbucks loyalty program account with their Twitter account. Consumers then send a $5 gift card by firing off a tweet to the @tweetacoffee handle and the recipient’s Twitter handle. Recipients can then redeem the offer by loading the gift card straight to the Starbucks’ mobile app, which is scanned at the point-of-sale by an employee. The offer can also be redeemed by showing the email confirming the gift card on a mobile device or by printing the E-mail." Let's break that down. Shoppers must first create a account, assuming they don't already have one. Then they must create a Twitter account, assuming they don't have one of those. Then they have to sync that account with their Twitter account, which involves a lot of info-sharing between the two. Read more...

Mobile-Use Incentives Look Good Until You Use A Calculator

September 13th, 2013
In another compelling pitch for consumers who are not really good at math, a Korean vendor (AppDisco) is offering Android mobile users money every time they unlock their phone (and look at an ad). How much money? Although they don't mention the figure on their site or in their news release, it turns out to be one-half of one penny—and no money is paid until the user accumulates $10.

That comes to 2,000 screen-activations before the consumer gets anything.Read more...

PCI Chief On Mobile Payment Strategies: I Wouldn’t If I Were You

September 13th, 2013
With so many companies—especially in retail—experimenting with using mobile in every possible way, it’s always nice to hear some encouraging words from a key security standards body chief.

But recent mobile remarks from the general manager of the PCI Security Standards Council—the group that controls how any merchant is allowed to use any kind of payment card—is enough to make a CIO long for the return of rotary dial. In effect, Bob Russo told a private conference call of QSAs (the people who assess whether someone is managing payment security properly) that when it comes to mobile security, it’s your neck if you want to proceed.Read more...

Our apologies. Due to legal and security copyright issues, we can't facilitate the printing of Premium Content. If you absolutely need a hard copy, please contact customer service.