Zebra Plastic Card Printers.

Zebra Plastic Card Printers come in a variety of styles and price ranges, including single-sided printers, dual sided printers, and security printers

Healthy Solutions for Healthcare.

The healthcare industry benefits from barcoding. Barcoding enhances patient safety and operational efficiency.

Seagull Scientific Products

Seagull Scientific BarTender is an industry-leading label design and barcode software. Seagull Scientific also develops true Windows printer drivers for bar code and thermal printers.

MC 9190G

The Ability To Satisfy Your Company Software Requirements.

Wireless Broadband

The unrivalled Motorola portfolio of Point-to-Point (PTP), Point-to-Multipoint (PMP), and Mesh Wide Area Network (MWAN), WLAN and VoWLAN solutions make governments, enterprises, and service providers more agile by helping them deploy voice, video, and data applications right where they need them.

Monday 27 February 2012

Mobile Up – Retail Cowboy

The cell phone boom came with the increase of the general public’s knowledge as to their use and power.

By 2015 it is estimated that 10 – 15% of retailers will have made the transition to mobile POS, as well as whispers of several other groundbreaking advancements (made possible by mobile POS). It can be said that the “mobile POS age” is two pronged; with the advent of the in store POS and
the integration of social media into the buyer’s experience through their own mobile devices. 50% of Americans now have smart phones and the numbers are increasing daily.

It appears that the hottest subjects for a POS upgrade to mobile (in the boutique retail scene) are new shops, those opting for mobile POS as part of opening new locations or those incorporating a POS upgrade to mobile POS as part of a design overhaul. Big box and department stores are starting to phase into mobile POS to increase efficiency and customer service; check out
Nordstrom if you want to see mobile POS in action.

If you were to compare the transition of the landline phone age to what is now ultimately the smart phone age, you see that technology transitions take time to roll out and POS upgrades take a definite effort on the part of a retailer.

In addition to mobile POS, retail technology is developing fast. Many retailers will be surprised at the overall benefits and increased precision that can be brought about with these tools, especially since many retailers do not fully use their existing POS. Whether it comes down to a lack
of training, time or interest – retail technology needs to be seen as the vital retail tool it is. The proper system, properly used can vastly improve a retailer’s customer contact management, marketing, inventory control, personnel production management and help ensure success. Mobile POS is poised to greatly enhance the retail industry.

As a retailer looking at the possibility of an upgrade into any new retail solution, one should assess its functionality and ensure that you are willing to fully roll it out, vastly increasing its return on investment. Training, installation and support should all be a part of what you
look for when selecting a vendor for your POS.

The mobile POS boom will come as retailers become familiar with its use and power. Old habits die hard, but out-dated POS habit may be one of things you should “take out back and shoot”.

Friday 24 February 2012

Using Fonts to Generate Barcodes in Quickbooks

by Nate Schubert

Quickbooks is a popular small business financial software that brings an array of powerful capabilities to small business owners who need to create reports, track inventory, print invoices or checks and much more. It is affordable, easy to use and since it is supported by Intuit, you can be assured that just about any of your technical or usage questions can and will be answered promptly, if they haven't already been addressed in their extensive community.

Many Quickbooks users have found great benefit in adding barcode generation and display capability to their invoices, reports, payroll checks and other forms. Quickbooks does not allow for independent components to be added to make their software more powerful. While this lack of flexibility makes it virtually impossible to generate 2D barcodes within Quickbooks, all is not lost!

Linear barcode fonts such as Code 39 and Codabar may be used quite easily within Quickbooks, and the process for doing this is very simple. Both of these symbologies are self-checking fonts, meaning they do not require complex encoding to convert the data-to-encode into a text string that will produce a readable barcode when the font is applied to it. In the case of Code 39 and Codabar, simply apply an asterisk before and after the data before highlighting it and selecting the appropriate font from your drop down list. The Quickbooks Barcode Integration Guide can assist with the details of adding these barcodes to Quickbooks.

Other linear barcode fonts are limited in their ability to generate barcodes in Quickbooks, mainly due to the fact that there are no Quickbooks-specific encoders available to encode the data. Where self-checking barcode fonts do not require encoding, most linear barcode fonts do require complex encoding. IDAutomation provides free font encoder tools to make this process as pain-free as possible, although they are not directly compatible with Quickbooks.

Despite the complexity in encoding data for barcode fonts such as Code 128, Intelligent Mail, UPC and others, workarounds do exist that can help you to meet your project goals. Following are a couple of alternative methods to generate linear barcodes in Quickbooks:

Use the Online Font Encoder Tool
The Online Barcode Font Encoder is a free tool that allows individual data encoding for use in applications where there are no compatible tools. Following are the steps to encode your data using this tool:

  1. Enter the data you want to encode in the Data to Encode field. Ex: IDAutomation .
  2. Click the button for the barcode type you want to generate. Ex: Code 128
  3. Copy the output in the Encoded Text field. Ex: ÌIDAutomation=Î
  4. Paste the encoded text into the application of your choice.
  5. Highlight the encoded text string and select the appropriate barcode type in your application to display the barcode.
This is an excellent for generating barcodes one-at-a-time in applications where there are no quality encoder tools available. That said, it may be somewhat time-consuming and tedious to encode your data individually, which is why this next workaround may be preferred.

Importing Encoded Data from Excel
Virtually every application or environment has the capability to connect to Excel in some way, allowing imported data in a variety of different ways. If there is a need to generate Code 128, Interleaved 2 of 5, Intelligent Mail or other barcode types in Quickbooks, the best option may be to first encode your data in Excel and then import that encoded data directly into quickbooks where the font can then be applied.

Utilizing Excel to ultimately generate barcodes in Quickbooks may seem like a time-consuming process, but due to Excel's efficiency and the ease with which data can be encoded there, the procedure can be easily understood and will open up opportunities to encode greater amounts of data than the Code 39 and Codabar barcodes that have occupied the Quickbooks space for so long.

Thursday 23 February 2012

Back from Mrket February 2012

Now that we are all back and settled from Mrket there were some definite recurring themes that have been abuzz in the office. One was the general reaction to mobile POS, hot, hot, HOT. This is definitely a movement and we are very proud to already have our products set up to accommodate mobile POS.

Secondly, FUR IS BIG. I don’t think fur has been quite this well represented in years. Between mobile POS and fur, this should shape up to be a fuzzy... fun year in retail.

While our feet may have been falling off by the end of this, it was a good event.

What is Your Loss Prevention Strategy?

By Scott Kreisberg, CEO One Step Retail Solutions

When it comes to security and protecting your assets, you need a good strategy. You will know how good that strategy is when you try to balance the cash register at the end of the day; when you do your physical count; when you are faced with a computer crash; or when too many of your customers start having identity theft on their cards. Do you want to wait until then to find out that your protection was inadequate?

The most effective method to achieve security has always been a layered approach. In other words, instead of just relying on a single solution, you set up a number of protective layers and thus greatly reduce the chances of being a victim.
Airports are an example of a layered approach: there are visual inspection of ID's and tickets before you are allowed beyond a certain point, there are TSA agents observing via cameras, there are metal detection imaging devices that you must go through, and there are personnel at the ramp to the plane who check tickets and ID's again.

We at One Step Retail take a similar approach to protecting you and your business from both external and internal threats. After all, we have been around helping retailers for 25 years and we hear about disasters from unprotected retailers. Consequently, we want to ensure you do not experience the same thing.
What would happen if all the information stored in your computer were suddenly lost? Or you had a hacker or virus or Trojan attack? Could you recreate this information? If so, how much time would it take? How much would it cost? What about dishonest employees? Most importantly, would your business survive?

In today's economic climate, it is vital to protect your assets and one of the most important assets you have is your data. If you lost it, it could possibly close your store. That may be hard to believe, but look at these statistics from Comdisco Vulnerability Index Research Report:

• 82% of companies are not prepared to handle a computer system disaster
• 83% of corporate data recoveries from tape backup FAIL
• Only 6% of companies that suffer from a catastrophic data loss survive

In our own backyard, we've seen it happen. Two different clients thought they were backing up and protected, but then their computers crashed and they discovered otherwise. After a year of manually inputting all the missing data, one retailer still occasionally scans an item that should be in the system but isn't. Another client lost years of data and had to pay for expensive data recovery but not all of it was recoverable.

In the category of dishonest employees, one client after six months of periodic cycle counts being off, finally traced down the problem to an employee taking fictitious “returns” and giving refunds-to herself. Another client had an employee who, as their Systems Administrator, embezzled money from them for five years. Months of sales information in their computer records was missing and she said they had been lost. Where was the backup? This company went out of business two years later.

One Step has researched resources and partnered with experienced, honest vendors to bring you layers of security specific to your needs as a retailer.
With RetailSafe, you have a professional backup service that knows retail and their data backup needs, plus you as our client get a discount for their services.
With sonicWall you get not only an intelligent state-of-the art firewall protecting you from malware, you get PCI compliance integrated into the system protecting your business from another type of disaster. You can buy firewalls including sonicWall at Amazon but none of them will be PCI Compliant out of the box. You must be trained on how to properly configure the firewall in order to meet PCI compliancy. So, buying them from anywhere else would be an utter waste of money.

With Quadrox you have a Network Video Recording system that can, among other things, integrate with your POS. The POS is a primary location for employee theft or mistakes. For example, you could quickly access the time when an employee issued a return and refund (as noted on the POS) and see actually what happened on the video—no cycle counts for six months to discover the dishonest employee.
So, start getting these layers firmly in place. If you have some or all of them already, make sure:

• they are working,
• you are verifying on a regular basis that they are working
• they are adequate for your specific needs as a retailer
• you understand them and can use all of their features
• you not only can use their features, you are using them

Retail Crime of the Future - Served with a Drink and Chips

By Amy Hanson, One Step Retail Solutions

News broke late last year about a “retail crime of the future”. Dating back to at least 2008, a small group of Romanian hackers have allegedly stolen credit card information through the POS systems of hundreds of small American businesses, adding up to more than 3 million dollars in fraudulent charges. The investigation is still pending, but the most serious attack was targeted at Subway franchises with at least 150 of their locations reportedly compromised. The 4 suspects are in custody, per the most recent reports.

The method of attack appears to be targeting certain POS “holes” through an essentially wide-open back door; a Trojan virus was then installed to give them ongoing easy access. As per the PCI Security Standards Council, those who process credit and debt payments must have a two-factor authentication for remote access to a POS system. Not having this security measure in place is where these particular businesses and franchises appear to have gone wrong.

In this digital age it is vital that retailers protect their customers by being fully PCI compliant and establishing layered security measures. PCI goals include “Build and Maintain a Secure Network” and “Implement Strong Access Control Measures” with some of the exact PCI requirements reading as follows:

“1. Install and maintain a firewall configuration to protect cardholder data…'
“10. Track and monitor all access to network resources and cardholder data.”

Did you know that reports show 56% of U.S. small businesses have experienced data breaches and 33% of all data breaches were directed at businesses with 100 employees or fewer? “The Subway credit card hack is unfortunately news that may happen with greater frequency.” says a FindLaw article about the recent 2008 to May 2011 hacks.

We highly recommend a layered approach, including installing a Sonic Wall Firewall, which offers a powerful security platform. SonicWall provides integrated anti-virus and anti-spyware, which is being updated every 5 minutes, thus providing real-time protection against a wide array of threats.

When you buy a SonicWall from One Step Retail, we configure it to be fully PCI Compliant. You also get:
• A business class device
• 3G failover, so if your Internet ever goes down and you have a 3G wireless adapter attached to the firewall then your internet will stay up.
• Content control to prevent employees from wasting time on sites like, You Tube and Facebook, etc.
• You would also be able to provide free Wi-Fi to your shoppers and secure wireless zone for mobile applications and devices.
Deep packet inspection of the entire content of information coming into the business via the Internet instead of just header or title.

"I don't know if Subway had unpatched vulnerabilities on its POS systems or what. But whatever merchants have to do, yikes, please do it." - Lisa Vaas of Sophos, antivirus software developer.

There is more to know about Firewalls than you think: Get a free Security Consult:
http://onestepretail.com/Products/SecuritySuite/

Sources:
www.pcisecuritystandards.org
http://arstechnica.com/business/news/2011/12/how-hackers-gave-subway-a-30-million-lesson-in-point-of-sale-security.ars
http://www.tgdaily.com/security-features/60147-arrests-made-over-subway-hack

Wednesday 8 February 2012

TSC invites to meet printers and team at LogiMAT










Date: 13.-15. March 2012
Place: New Stuttgart Trade Fair Centre, Stuttgart, Germany
Hall: 5
Booth: 335

From March 13 to 15, 2012, TSC Auto ID EMEA Technology GmbH will be at LogiMAT 2012 in Stuttgart to present their latest product development, the Alpha-3R portable label printer, for the first time in Germany. This superlight 550 g printer has a variety of attractive standard and high-performance features that simply cannot be found in comparable printers in its class. TSC Auto ID will also be presenting its TTP-2410M Pro series, which is based on the familiar best-selling TTP-2410M and guarantees top performance in industrial thermal transfer printing.

With the new Alpha-3R portable thermal direct printer, TSC Auto ID is setting yet another new highlight. The Alpha-3R prints a maximum print length of 2,268 mm (more than twice that of a comparable model from the competition!) and at a print speed of 100 mm/sec and a resolution of 203 dpi, for razor-sharp labels with a printed width of up to 80 mm. That makes the Alpha-3R perfect for many requirements in commerce, in sales, in the warehouse, in production or in transportation – but also in the public arena such as the police, fire-fighters or clinical uses. 8 MB DRAM and 4 MB of Flash memory provide plenty of storage capacity. USB 2.0 is integrated by default, along with the programming languages TSPL-EZ (EPL2, ZPL2) and CPCL.

Of course, TSC Auto ID will also offer a comprehensive overview at the conference of its entire product line of high-performance desktop and industrial printers, as well as mobile devices – and the ideal label solution for every application in industry, trade, logistics, transport and health care.

How to Make UPC Barcodes in Excel

Needing a UPC barcode for your product/s really is a measure of success. It means you're working with established retailers or distributors who are fully engaged in the retail channel, upping the chances that your widget will be a winner. You're probably just days away from becoming a thousandaire! Hurray! Congratulations! Once you've got your raw UPC numbers from GS1 (or from us!), you're ready

How to Install Barcode Fonts

by Nate Schubert

Contrary to popular belief, installing barcode fonts is every bit as simple as installing any other type of letter font such as times new roman or comic sans. Particular font installation may differ depending on whether you are installing TrueType, Postscript, PCL or Open Type formats. Additionally, there are different procedures depending on the specific operating system. In every case, the demo or purchased font package should be downloaded, unzipped and the files extracted. Then, click the install.exe file in the extraction to install the fonts into the fonts folder of your operating system.

Installation instructions diverge at this point according to the particular operating system you are working with. Following are just a few short tutorials for various environments that you can use, and these tutorials should work for any font installation.

You can find more specific tutorials for other font-related issues at our font installation guides. The IDAutomation Technical Support staff has created a video tutorial for Windows 7 font installation which can be viewed below.



Tuesday 7 February 2012

Azalea's Code 128 Software in Excel

When you've got a zillion Code 128 barcodes to create, you don't want to have to make them one at a time. That's one zillion opportunities for typos, transposed digits or fat-fingering your keyboard into barcodes that are wrong, wrong, wrong. And if it's wrong, what's the point? Barcodes are here to make our lives easier, like robot servants and indoor plumbing.The best way to make a buncha'

Monday 6 February 2012

How to Copy Excel Macros

If you're anything like me, trying to use the advanced features in an Excel spreadsheet can be like trying to fly the space shuttle when you're used to riding a moped. Macros, user-defined functions, formulas, WHAT DO THEY ALL MEAN?!A macro - a built-in call, action, or process - in an Excel spreadsheet is actually one of the most useful functions you can access. And there are a zillion macros

What Kind of Barcode Do I Need?!

Figuring out which barcode type (or 'symbology') to use for your data can be confusing. Do you need a UPC barcode? A Code 128? An Interleaved 2 of 5 (ITF), Code 39, POSTNET or Codabar or PDF417? If this is all gobbledygook to you, check out our super handy video tutorial for tips and tricks on how to pinpoint which barcode you should use for which project.