Digitizing the Shopping Journey

When a consumer browses a product or online store, ads seemingly follow them around the internet, enticing them to come back, take another look, or buy. When the same consumer is in a physical store, the retailer still has options to bring the customer back to the product and encourage them to buy. The challenge is how to use the data – the demographics, shopper preferences, and previous physical browsing history – to build an in-store experience that’s similar to an online experience.

Data Rich, Information Poor

Download our white paper Digitizing the Shopping Journey: Building a Business Model on Never Saying “No”Today’s retailers have access to more personal customer data, including tracking online and mobile searches through browser cookies and location data, in-store facial recognition technology, NFC, e-wallet, RFID tags, beacons, or simply monitoring whether a customer opens the store’s emails.

The challenge is not necessarily obtaining the data. The trick for retailers is now to figure out how to use all the data they accumulate to create better in-store experiences and products. Retailers are data rich, information poor.

Download our whitepaper “Digitizing the Shopping Journey: Building a Business Model on Never saying “No” Intent of the Data

Random gathering of data, originally intended to move retail into the future, now challenges retailers to thoughtfully formulate its use.  Used properly, valuable customer information can personalize messages, customize preferences, appeal to each individual shopper in a social way, and digitize their shopping journey.

To help retailers employ the overwhelming mountain of data, NEC retail solutions go beyond “cool hype” to provide value and increase efficiency. As an example, Stanchion™ Store software from NEC offers real-time access to data, enabling stores to respond faster to customers, improve communications and increase in-store productivity.

Easily configurable and cross-platform agnostic, retailers can expect:

  • The ability to control point-of-sale (POS) specific tasks, including modifying the user interface, searching for products, checking prices and more.
  • Enterprise-level, back-office capabilities including managing all aspects of in-store operations and system administration.
  • Fast and flexible tools for managing shelf labels, reporting, producing promotional displays, activating campaigns on the fly, and managing data through all stores.
  • Customization based on local-level market demands and reporting to help increase sales.

 See how NEC is using data analytics to digitize the shopping journey

Data Security and Customer Loyalty

Retailers must also consider that customers will stay loyal if their data is accessible and secure. Consumers want to be able to easily obtain and opt out of stores’ access to their personal and financial information. Data breaches and hacking have made some shoppers wary of sharing or storing their data with online or traditional retailers.

As stores continue to amass customer data, their responsibility for its use becomes greater year after year. Retailers need to understand their options for using customer data and how it can create a stronger relationship between customers and stores. With technological advances and online retailers ambitiously considering the future of shopping, partnership and guidance is required instead impulsively purchasing disparate solutions.

How can #retailers create a stronger relationship between customers and stores using #data? #CX Click To Tweet

The bottom line is this: if a shopper continues to have a positive experience with the retailer and feels a sense of reward for remaining loyal and relinquishing their information, the retailer may have created a customer for life.

Use of Data for Cashless Payments

Amazon Go, the new “grab and go” concept uses current technologies, but employs the data like never before. Shoppers are encouraged to walk into a prototype store, pick up their items, and simply walk out, without any interaction with a cashier or checkout counter.

For retailers to consider a similar concept, solutions to manage mobile POS, supply chain and inventory, and biometrics or facial recognition for payment are helpful. While shoppers are looking for convenience, they may still need to interact with retail employees within the store. Inventory must also be managed and restocked as customers make purchases.

NEC’s NeoFace® facial recognition engine is recognized as providing the highest level of authentication accuracy and is currently deployed among law enforcement agencies around the world. After a series of trials with Japan’s SMBC and Sumitomo Mitsui Card in late 2016, NEC debuted NeoFace® as a facial payment solution at 2017’s NRF Retail’s Big Show.

The technology matches pre-registered customer images with those in the POS system. Customers are also given a PIN to secure their account and confirm their identity. As with the Amazon Go prototype, NEC is tracking the solution through its trials with SMBC and within the company’s headquarters in Japan.

Watch this quick video to learn more:

Take a look at how we’re transforming the customer experience through NEC’s Retail Solutions.

NEC Corporation of America

Free White Paper
Digitizing the Shopping Journey

Learn how you can level the playing field between brick and mortar commerce and ecommerce by filling out the form to download the white paper.

 



2017 Emergency Assistance and Relief Program

Hurricane Harvey has left a path of destruction along the southern parts of Texas and Louisiana. There are currently major fires ongoing in the majority of the northwestern states and California that are devastating thousands of acres along with many towns. Hurricane Irma has already wreaked havoc on the U.S. Virgin Islands and Puerto Rico, and the projections indicate similar destruction potential for Florida and the Southeast. NEC has many customers, as well as employees and Channel Partners in these affected areas. Our hearts and deepest sympathies are with the families and victims of these devastating natural disasters.

NEC has a sincere desire to help support businesses that have been damaged or destroyed by these devastating storms and fires. To assist affected customers and channel partners, NEC is implementing the 2017 Emergency Assistance and Relief Program.

This Program is designed to help our customers and channel partners recover as quickly and completely as possible. NEC understands that when your communications systems are down, your business shuts down. It is very important to get them up and running as quickly as possible.

The Program offers businesses with damaged communications and data center (servers & storage) systems in declared Emergency and Major Disaster areas by the Federal Emergency Management Agency (FEMA) special financing, payment terms, a technical support hotline, and select waived implementation fees.

For a customer or channel partner to qualify for NEC’s 2017 Emergency Assistance and Relief Program, they must be located in a county in the declared Emergency Disaster area and replacing equipment damaged on or after August 1, 2017. To confirm if you are in an area (county) that qualifies for this program, please refer to the Federal Emergency Management Agency Disaster Declarations web page of the U.S. Department of Homeland Security web site. To verify individual addresses, please refer to the Disaster Assistance.Gov web site.

Also, a great interim solution, as well as long term option, is NEC’s UNIVERGE BLUE Business Cloud Services to get you immediately connected. A softphone can easily be loaded onto your mobile device until you can get your on-premises solution back up and running. Through this assistance program, NEC is waiving implementation/activation fees on UNIVERGE BLUE Business Cloud Services for disaster affected customers.

In addition to NEC’s 2017 Emergency Assistance and Relief Program, we remind you that your acquisition of new equipment and/or software should qualify for the Section 179 deduction. Section 179 can provide you with significant tax relief for this 2017 tax year. To learn more and calculate your potential deduction savings, refer to – Section179.org.

NEC is aware of the difficult times ahead and we hope that this Program will help with your recovery and rebuilding efforts, and make the process a little easier. Again, our hearts and deepest sympathies are with those affected and we want you to know that we are here to help in any way that we can!

Here are some links to resources that may be of help:
Federal Emergency Management Agency (FEMA)
FEMA Hurricane Irma
Federal Emergency Management Agency Disaster Declarations
DisasterAssistance.Gov
Disaster Recovery Center Locator
FEMA Individual Disaster Assistance
FEMA Emergency Management Agencies Information
Ready.Gov – Plan Ahead for Disasters
Please reach out to us if you have any questions or if we can be of any assistance.

Smart Enterprise

Need Assistance?
Let us know!

Was your business affected by one of the recent storms or fires? Please let us know by filling out the form, and we’ll contact you.

 

 



Left of Boom – Defeating the Threat Among Us

It’s no secret the world has become a much more dangerous and complicated place in the 21st century. Terrorism itself has evolved, and so has the way our federal government is combatting and defending against it.

What has become clear is that violent extremist groups like ISIS and Al Qaeda have evolved to become influencers and master manipulators online and abroad. They’re not as focused on becoming an army of covert foot soldiers attempting to penetrate U.S. borders. The result of this is the evolution of the lone wolf attacker, a typically misguided and desperate soul who loses touch with reality and is somehow convinced or brainwashed into inflicting maximum damage through violence. We’ve seen this play out recently in the United Kingdom.

Since 2001, the United States has suffered over 40 lone-wolf terror attacks perpetrated by a diverse array of personality types. Although there is no single, universally accepted definition of a lone-wolf terror attack, academics generally define a lone wolf as a single attacker who plans and commits violent acts alone, outside of any command structure and without material assistance from any group.

The perpetrators of these terrible atrocities may be influenced by extreme political ideologies claiming religious motivations, or they may be disgruntled or mentally ill. In many cases, a combination of these factors are at play. The point is, profiles for these lone-wolf terrorists are consistently challenging to identify, which therefore makes prevention of individual attacks particularly difficult. The threat, needless to say, is even greater with those in positions of trust. Airport or airline employees and contractors with access to military installations with secure credentials are examples of individuals who are sometimes susceptible to these downfalls.

Since 2001, the U.S. has suffered over 40 lone-wolf terror attacks. #homelandsecurity Click To Tweet

Where lone wolves or any violent threats are concerned, the goal is to stay “left of boom.” Popularized in military circles during the months and years after 9/11, the phrase “left of boom” refers to the moments before an explosion or attack – a period when you still have time to prepare and avert a crisis. Right of boom, by contrast, includes the chaotic and deadly moments after the explosion or attack.

Law enforcement, public safety, and military officials associated with the people who perpetrate these terrorist acts. Research suggests early detection through preventative measures like situational awareness, monitoring Internet and social channels, and if needed, psychological screenings and interventions, are the best approaches to thwarting lone wolf attacks.

Individuals who carry out these attacks do follow a similar path from ideological influence to radicalization to violence. This path begins with a grievance that leads to moral outrage and anger projection, which leads to some sort of trigger point or justification for violence. At this point in the process, most people do not act.

Want more information about a Safety and Security solution from NEC?

However, for the few who do act, either alone or in a group, the perpetrators tend to wade into an ideological end-state culminating in a terror attack. The fact that a process exists provides officials with some map to begin gathering information that might lead to prediction and prevention. Our public servants want to get left of boom in order to disrupt the chain of events that could lead to an attack.

At NEC, we’re passionate about the safety and security of all citizens. We are committed to providing solutions that assist our clients in identifying people, patterns, and predictions. For over 40 years, NEC Corporation has provided screening and background check information for purposes of law enforcement and applicant background checks. Our systems have cast the widest nets in identifying these individuals from searching local, state, FBI, DHS, Interpol and other biographic and biometrics databases.

NEC adheres to FBI, National Institute of Standards and Technology (NIST), and other industry standards for data exchange, as demonstrated by our customer install base. These deployments could allow law enforcement agencies to receive immediate notification of fault. Other random and frictionless screening with use of facial recognition may provide clues on relationships, associates and more. Such existing services can be augmented with publicly available biographic data including travel and purchase patterns to form the foundation of a collective dataset that would assist in analysis and identification of suspicious patterns leading to a prediction.

If we can look at an individual’s identity, patterns of life, and associations – among other data points – we can help our clients get closer to predicting and preventing lone-wolf attacks. We pride ourselves on being passionate problem solvers with an eye toward cutting-edge solutions that deliver precise and trusted results. If you’d like to hear more about our solutions and how we are solving the challenge of the threat among us, please contact us today.

People. Patterns. Predictions.
NEC Corporation of America’s Advanced Recognition Systems team is committed to developing and delivering public safety solutions that keep people safe.

NEC Retail Solutions

Want more information about a Safety and Security solution?

Fill out the form, and we’ll have a solutions expert reach out to you.

 

 



NEC Advanced Recognition Systems Launches NeoFace® Express at Connect:ID

The connect:ID Conference and Exposition held May 1-3 at the Walter E. Washington Convention Center in Washington D.C. has grown in size and significance as governments, the private sector, and consumers, increasingly realize the importance of secure identity recognition solutions. The three-day event drew together the world’s leading minds and offered end users practical advice, examined current government policies, and provided thought-provoking insights into the future of identity through the use of biometrics technology.

This year, NEC’s Advanced Recognition Systems was a Silver Sponsor at the conference. We demonstrated our fully integrated end-to-end identification solutions from collection to matching to enabling diverse missions. Our open architecture solutions integrate with other COTS technologies to seamless support customers.

Want more information about a Safety and Security solution from NEC?

One of the most popular attractions was the demo of the newly launched NeoFace Express, a rapid-access biometric solution based on NEC’s world-renowned facial recognition technology. This solution represents a new class of facial recognition system setting the stage for the future of travel, secure access and identity recognition. Its unique capabilities are the result of NEC’s years of research and global deployment experience in high-throughput identity authentication. With its robust capture process and sleek design, it delivers frictionless, seamless enrollment, verification and identification in a variety of settings, such as airports, border crossings, ports of entry/exit and other high-demand, high-traffic areas.

NEC also showcased other innovative identification technologies including SmartScan, NeoFace Watch, NeoScan45 and Integra-ID iBW5. The National Institute of Standards and Technology (NIST) matching algorithm recognition benchmarks have consistently proven that NEC’s biometric technologies have the fastest and most accurate face and fingerprint recognition algorithm and have the most resilient facial recognition technologies to viewing low angles, low-resolution images and poor image quality. View Our Complete NIST Rankings.

On Day One, I presented Airport Screening and Security of the Future. In his session, he covered the recent and future technology trends expected to bring change to screening and security at airports across the United States – from reservation to the traveler’s final destination. He examined video surveillance, multimodal biometric solutions, e-tickets, and pre-registration programs all geared toward enhancing security and convenience of passengers in airports. The same day, Benji also chaired a panel discussion, Disruptive Global Trends and the Role of Effective Identity Technology. The panel discussed the threat of terrorism, mass displacement and movement of populations, and political implications.

After a long day on the show floor, NEC hosted a private networking event at Casa Luca, where over 90 event attendees enjoyed a relaxing evening with their colleagues and the soulful cuisine from the Marche region of Italy’s central Adriatic coast.

For additional information and to stay up on the latest, follow us on Twitter and check out our NEC Advanced Recognition Systems page online.

Advanced Recognition Systems and Solutions

Want more information about a Safety and Security solution?

Fill out the form, and we’ll have a solutions expert reach out to you.

 

 

 



Fast, High-Accuracy Facial Recognition will be Best for Executive Ordered Biometric Entry-Exit Tracking

In early March of this year, President Trump released a revised version of a previously released Executive Order titled “Protecting the Nation from Foreign Terrorist Entry into the United States.” Section 8 of this Executive Order directs the Department of Homeland Security (DHS) to expedite the completion of a biometric entry-exit tracking system. This new biometric enabled entry and exit vetting system poses a number of interesting challenges and opportunities for all stakeholders.

Department of Homeland Security and CBP Focus
Every day, approximately 100,000 flights take off around the globe with over 3.7 billion passengers projected to fly in 2017. The U.S. accounts for almost a quarter of that air travel currently. Our federal policy, infrastructure, manpower and technology are currently aligned to facilitate vetting individuals as they enter the country, but the same alignment is not in place to vet individuals exiting our borders. This allows foreign nationals to overstay visas and continue to live in the U.S. illegally. Addressing this exit challenge requires concerted efforts to align policy (domestic and international), invest in new border infrastructure, and leverage the best of biometric technology to ensure accurate, efficient identity vetting.

Border Entry and Exit Challenges
Luckily, the state-of-the-art in biometric vetting technology has evolved significantly since lawmakers initially envisioned the biometric entry/exit system in the wake of 9/11. Gone are the days of cost prohibitive and complex biometric technology. Fingerprints have long been considered one of the gold standard modalities of biometrics. These technologies require travelers to stop and submit fingerprints when crossing borders, thereby limiting throughput.

Face Recognition Provides Unique Benefits
The best solution for a modern biometric entry/exit system requires the stand-off, high-throughput, and extreme accuracy of facial recognition. U.S. Customs and Border Protection (CBP) has expressed an interest in a future where crossing borders leverages the security, convenience, and speed of frictionless authentication through facial recognition. NEC sees a similar world where travelers and passengers move seamlessly through transportation spaces such as airports. Their data are collected without contact so moving individuals do not need to stop to present fingerprints or a secure tokens such as a passport, border card, or driver’s license.

Furthermore, facial recognition technology does not require a large footprint or major renovations to existing border infrastructure. Where there are infrastructure challenges at the borders and ports of entry, facial recognition can be installed with minimal disruption to travel patterns or the need for additional queues or checkpoints. Fast and effective, facial recognition also works at a distance which will minimize travel friction at high-traffic areas. Effective policy that synchronizes data from the Department of State, Department of Homeland Security, Department of Defense and various federal law enforcement agencies will create an iron-clad backbone for the U.S. government to know who is currently on U.S. soil.

The next 12 to 18 months will be an exciting time of rapid change for all stakeholders involved in protecting our borders. The deployment of an effective and efficient biometric entry/exit system will undoubtedly enhance the level of security and convenience for travelers crossing our borders. This system will also support the flow of commerce, free from security threats. These attributes will contribute to the safety, security, and wellbeing of our nation.

Contact us today if you like to learn more about how NEC’s Advanced Recognition Systems can help your government agency.

Advanced Recognition Systems and Solutions

Want more information about a Safety and Security solution?

Fill out the form, and we’ll have a solutions expert reach out to you.