Our final post in this series brings us to the topic of data security in restaurants, where, all too often, credit cards go missing, numbers get stored in the wrong place, or both. Not only do you have to keep a vigilant eye on how sensitive data is being handled, but also where it is stored and the strength of the storage’s security. According to Radiant Systems, the cost of a data security breach is enough to disrupt your business, with the credit card brands charging fining you anywhere from $5,000 to $50,000. It happens often enough to scare some would-be restaurant owners away from the idea. Needless to say, it pays to keep everything locked tight and out of sight.
by Dr Will @ Iconic
A lot of the reaction to the Target security breach has fixated on the backwardness of the physical data storage of American credit cards. The story goes that if only banks would hurry up and get us onto the "Chip and PIN" Europay MasterCard Visa card, we'd all be safer from breaches like this. Chip and PIN cards have some security advantages over the magnetic strip, but it's not likely it would have made much difference in this case.
So what's been the point of this series? (In case you've missed any of these, here are the first four posts.) Hopefully, I've convinced you that the insights behind the famed Toyota Production System are not just for gigantic manufacturers. Anyone who does work (i.e., exerts mental and/or physical energy to make things different from the way they are) can benefit from a study of the muda with an intent to eliminate them. If even a country club -- which is in the business of fostering leisure and extravagance -- can operate more efficiently without destroying its essence, then so can any service or retail operation.
The first annual xTupleCon was held in Norfolk, VA October 10-12. Hosted by xTuple - the institution under-girding support for tens of thousands of PostBooks users world-wide, the conference brought xTuple/PostBooks users and xTuple partners together for a congenial blend of technical- and business-oriented talks. And fun, of course!
Mathematicians developed Little's Law (which we discussed in last week's post) to solve a limited problem of measuring customer flow. The idea was to prove that you could calculate the average time spent by a customer at a location by dividing an average head count by the average arrival rate. But it turns out that this handy formula can be used to calculate the flow rate of any kind of inventory at all.
Your humble narrator ... well ... your narrator recently attended a S.C.O.R.E. (Service Corps of Retired Executives) conference on marketing. On the top of the agenda - permeating the agenda - was social media.
Today's post on inventory management is taken from an article posted on Small Business. The article focuses mainly on inventory management for retail clothing stores, but the tips and practices outlined in the article can easily be adapted to any retail environment.
Last time we looked at some of the cast of characters in hackerdom and their motivations. This time we want to look at how they can attack you and what you can do to make yourself less of a target.
Risk is everywhere. The internet is everywhere. Therefore the internet is risk ... and vice versa. Q.E.D.