Remove Applications Remove Barcode Remove Retail
article thumbnail

AI at the retail edge: What’s new, and what’s coming soon

CIO Business Intelligence

Simultaneously, increases in compute power have made it easier to implement AI use cases at the retail edge. That’s a perfect opportunity for some long-awaited retail use cases to turn prime time. RFID has several other beneficial uses in clothing retail. RFID can even enable self-service checkouts in the apparel industry.

Retail 124
article thumbnail

Nvidia offers retail loss prevention software to accelerate accelerator chip sales

CIO Business Intelligence

GPU manufacturer Nvidia is expanding its enterprise software offering with three new AI workflows for retailers it hopes will also drive sales of its hardware accelerators. Nvidia isn’t packaging these workflows as off-the-shelf applications, however. The workflows are built on Nvidia’s existing AI technology platform.

Retail 75
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Future of Shopping

Galido

Mobile applications and automation is changing the face of shopping. Barcode Scanning. One technology that has been around for many years now is barcode scanning. One technology that has been around for many years now is barcode scanning. Every store now has an app and almost anything can now be ordered online.

Barcode 60
article thumbnail

Stealing payment card data and PINs from POS systems is dead easy

Network World

Many of the large payment card breaches that hit retail and hospitality businesses in recent years were the result of attackers infecting point-of-sale systems with memory-scraping malware. They typically run Windows and have peripherals like keyboards, touch screens, barcode scanners and card readers with PIN pads.

System 60
article thumbnail

Proving Physical Product Authenticity with Cryptographic Invisible Signatures

Dataconomy

The evolution of digital watermarking led to its application in diverse fields, including audio recordings, software, and even printed documents, and the technique – which can fall into both the cryptographic and the steganographic fields – has even been used by spies and hackers to transfer secrets or deliver malicious payloads.