Skip to main content

Home/ Hospitality Technology/ Group items tagged PDA

Rss Feed Group items tagged

Yanique Coach

Hardware and software tools you need for web design- (ts) Articles - 0 views

  • A computer to be used for web design should have a large hard disk and Random Access Memory, high processing speed and large storage capacity to be able to process the large video files.
  • Two servers are needed, the hardware and software servers which are important for web hosting. The relevant software for instance Dreamweaver and Microsoft front page need to be available before any progress can be made in construction of the site.
  • It is important to have a good antivirus or software that prevents the website from external threats.
  • ...3 more annotations...
  • If you are considering hosting videos in your site, it would be important to take the videos yourself.
  • You can also have mobile web design and editing software to edit and modify the website from any location.
  • Depending on the content you will put in the website, you may also need databases. Dynamic websites are examples of sites that require the use of database.
  •  
    To design a website hardware and software tools are needed. A computer with a large hard disk, Random Access Memory to store data, high processing speed and large storage capacity is necessary to be able to process large video files that you would need to put on these websites. with videos, its best to take them yourself so as to lessen the cost of production. Two servers are needed both hardware and software. Microsoft front page is a software needed before constructing the site because it is a website design and management tool that is used to add, rename, delete or move around files. It also contains web pages, graphics, documents and multimedia. A good anti-virus or software is important to have for web design to prevent external threats. Backing up the website should be done through emails, where it can be restored if any problems occur. With mobile web design and editing software you can edit your site from any location and it can be viewed on smart phones, PDAs etc. Some website require databases, for example Dynamic websites. This is prepared with fresh information and is easier to update with new contents for the webpage.
Caroline Hardenbergh

Wanted: Crackberry Netiquette - 0 views

  • Thanks to the ever-growing presence of portable wireless devices in professional circles, your attendees are likely to find distraction during a meeting in their cell phones, laptops, or personal digital assistants (PDAs). For instance, handheld Internet devices called BlackBerries are proving especially popular among execs--in fact, they're sometimes called "CrackBerries" because of their addictive quality. That's why so many white-collar workers can't stop checking their e-mail while they're supposed to be paying attention. Since portable wireless technology is still relatively new, rules of etiquette have not yet been uniformly established. A 2004 survey by Menlo Park, CA-based Robert Half Technology found that two-thirds of chief information officers think technology-related blunders are increasing in the workplace. This would include behavior at meetings, where the most common offenses include leaving cell-phone ringers on, sending instant messages and e-mail using wireless devices, and typing on laptops out of turn. Internet etiquette, or "Netiquette," is a sore spot as well. The unchecked use of wireless devices at meetings is a drawback of the new gadgets
  •  
    Source: Successful Meetings; Mar2005, Vol. 54 Issue 3, p28-34; Author: Ben Chapman bchapman@successfulmeetings.com I am posting this article because if points out another netiquette issue, which is having consideration for those outside your internet access zone, such as the public nearby, companions, and most importantly, your business supervisors and peers. This article discusses the pitfalls of technology when it comes to conducting meetings, whereas the attendees are not fully engaged due to their focus on their personal devices. While it was posted in 2005, and stating that establishment of etiquette rules are yet to be established, I still do not see indication seven years later that this trend of attentiveness towards one's device over the person next to you (or presenting to a group) has changed for the better. Not only that, but apparently meeting attendees have actually emailed the presenter to express their boredom with the meeting, and while it's good for coordinators to know how engaged the audience is, it still is very rude. The article does say that "awareness of etiquette is rising as technology matures" and "it's hip to have manners," but I don't see it in school nor in the workplace. Employers have all adopted guidelines regarding use of personal devices to limit use during work hours, and even to constrain employees online social activities to forbid use of their company name or to post disparaging comments. I find it sadly amusing that the very instruments which are meant to increase productivity and provide increased communication and professional interaction is becoming the very opposite in the workplace and during professional development venues.
Hyeyoung Jang

Technology to the Aid of Middle East Hospitality Sector | Hospitality Technology - 0 views

  • Today’s technology is equipped with user friendly interfaces that hasten operations; tools like point-of-sale (POS) systems have easy billing with multiple window options. PMS’s provide a single screen check-in for guests, speed up front desk operations and can be configured to efficiently manage energy usage in rooms. Along with easy interfaces, centralized technology enables hoteliers to efficiently manage operations across departments and chains. An integrated PMS captures guests’ information that is gathered at check-in and makes it access at multiple touch points. Features such as these enable hoteliers to pull up guest information and leverage it to offer personalized service, such as choice of rooms and meal options. At time of check-out, software solutions in combination with cutting edge technology like RFID also assist to keep track of pilfered linens and other items.
  •  
    This article talk about the PMS system in Middle east recent years. It is an important time of year for the hospitality industry in the Middle East. The region's industry has witnessed a strong recovery of 78.6% occupancy rates over last year and the holiday season continues to hold tremendous promise of high tourist traffic and increased occupancy. With the highlight of the year- Dubai Shopping Festival 2012 fast approaching, hoteliers need to brace themselves for round-the-clock services as they run at nearly 100% occupancy. Here will be integral for them to relook at existing business procedures to ensure efficient use of resources and enhanced guest experience. Technology is a key driver of business growth for the hospitality sector across segments. While hotels leverage technology, hoteliers need to remember that mere adoption of innovation does not suffice. Effective implementation of required hardware and software proves beneficial only if the hotel ERP is adequately aligned with the hotel's business needs. In 2010, tourist arrivals to theMiddle East increased by 14%, registering a total of 56.6 million tourists. The positive outlook of the year ahead will place an impetus on the adoption and implementation of CRM tools as well. Luxury hotel chains in theMiddle Eastalready offer rewards and loyalty programs for customers, however, with the advent of social media, CRM tools have been revised to track discussions and reviews on hotel properties. One of the key challenges for large hotel chains is to stay connected with their managers on-the-go. Hand held devices like PDAs enable hoteliers to stay connected with ongoing activities at their property and an integrated PMS system sends out automated updates to improve communications.
sophia edwards

M-Commerce Equals M- - 0 views

M-Commerce Equals M-Reservations!  The article goes in details about the advantages if m-commerce and how its basically a spin off from e commerce. The M-commerce technology combinds the old (...

M-Commerce Equals M-Reservations!

started by sophia edwards on 23 Jun 12 no follow-up yet
sophia edwards

M-Commerce Equals M- - 0 views

M-Commerce Equals M-Reservations!  The article goes in details about the advantages if m-commerce and how its basically a spin off from e commerce. The M-commerce technology combinds the old (...

M-Commerce Equals M-Reservations!

started by sophia edwards on 23 Jun 12 no follow-up yet
jennifer amador

Spreading the netiquette gospel at work - CNN - 0 views

  • Spreading the netiquette gospel at work
  • Your co-workers, of course, are another story. And their lack of netiquette skills isn't just an annoying but innocuous reflection of their poor upbringing; it can actually hurt the entire company.
  • But consider that whoever has no problem speaking to you that way likely sends inappropriate missives to the outside world: clients, partners, prospective customers and so on. Anyone with a corporate e-mail address is a company ambassador with every note he or she sends.
  • ...2 more annotations...
  • You know how when you're pitching an idea in a meeting and a higher-up's BlackBerry buzzes on the table and he leans in to read it and you're mortified and start stuttering and everyone becomes engrossed in watching him leisurely reach for the silence button?
  • About two-thirds of employees say PDAs are a distraction in meetings, according to a Lexis-Nexis survey. What's more, research from Washington University in St. Louis found that a ring tone blaring midclass hampered students' recall of the material covered by about 25 percent.
  •  
    Netiquette is very important in today's industry as it can only improve and enhance our way of communicating and networking. Also, everything is pretty much done by conference calls, audio visuals and over the internet by exchanging emails and web links. I personally believe that Netiquette should only be improve on because that is where the world of today is looking forward to and addressing too.
marble_bird

Hotel_ITSec.pdf - 0 views

shared by marble_bird on 15 Jul 20 - No Cached
  • During the past decade, information technology (IT) has significantly changed the way the hotel industry controls and manages operations. While many technologies have been utilized, some newer technologies have emerged in the literature and in practice, and many of them impact the hotel’s security.
  • Among the results, this study identified a gap between hoteliers’ understanding of IT budget adequacy and the adequacy of installed IT security systems.
  • Advancements in technology are increasing at a remarkable rate. As technology becomes more important, organizations that do not keep up with these advancements could lose business opportunities to other competitors that do
  • ...53 more annotations...
  • The four leading technologies which have showed a high adoption rate from the industry and have received attention from academia are: self-service, wireless, green, and security technologies. The advantages of these technologies for hoteliers include enhanced customer services and operational efficiency (Doyle, 2007), decreased guest wait times, more efficient methods to settle bills (Singh & Kasavana, 2005), reduction of energy costs (Meeroff & Scarlatos, 2007), and protection of sensitive customer data and credit card numbers
  • In addition, exploring the influential factors of security system usage will provide greater depth of knowledge with respect to why some hotels have adopted more security systems than others.
  • there is still a lack of understanding of the nature of risk associated with inadequate IT security, especially among operators of hotels that do not have their own IT departments.
  • Self-service technologies are commonly defined as devices or applications which permit users to produce a service independent from the direct involvement of the service provider (Meuter, Ostrom, Roundtree, & Bitner, 2000). The use of self-service technologies in the hotel industry has grown considerably, especially in the areas of self check-in, in-room check-out, and foodservice kiosks
  • IT systems refer to general support systems such as mainframe computer, mid-range computer, and local area network.
  • Some of the most significant wireless technology applications involve the use of mobile handheld devices, such as personal digital assistants (PDA), tablet PCs, and cellular phones, or RFID (radio frequency identification). RFID utilizes computer chips and antennas, allowing the chips to wirelessly communicate with a receiver.
  • While the major usage of RFID in the hotel industry was for inventory control purposes, it also has the potential to be utilized in ways that can provide more conveniences for the guests.
  • Other possible uses include placing RFID tags on items of high value as a means of theft prevention or integrating tags into guest loyalty cards for easy identification
  • IT investment that lowers environmental impact and IT that manages the environmental impact of other systems are commonly referred to as “green technology”
  • Many hoteliers might think becoming more environmentally friendly will cost more for their hotels. However, it has been demonstrated that “going green” is not only the right thing to do for the environment but also provides tangible bottom-line benefits for hotels by reducing consumption of energy and water, as well as other related costs.
  • Some of the risk factors involved include reliability, security, and privacy issues
  • risk associated with a breach of IT systems security (e.g., network break-ins) is very high. Consequently, no sector of the business community is exempt from attacks on their IT systems, with an attack being defined as a technique used to exploit a system’s vulnerabilities.
  • Many of these attacks involve attempts by thieves to gain access to customer credit card data, and these attempts constitute a major portion of the risk inherent in IT security
  • if a system is breached and the merchant is not PCI compliant, the merchant then is responsible for all costs associated with improperly used credit card information taken from that system (Kress, 2008). These losses could bankrupt a business if the security breach goes undetected for even a short time.
  • IT security systems are those measures taken to protect the confidentiality and integrity of proprietary data.
  • two main paradigms of adoption are believed to occur: bottom-up adoption and top-down adoption.
  • Thus, it is reasonable to assume that organizational factors (e.g., financial factor, human resource) will influence the implementation stage of security systems at a hotel.
  • A hotel with sufficient IT budget will install more security systems than those with insufficient IT budget.
  • That is, if a hotel does not have its own IT department, it will have a negative influence on successfully installing or maintaining necessary security systems.
  • A hotel with its own IT department will install more security systems than those without.
  • Overall, the state of IT spending on security continues undiminished because managed security services are required for almost every application (Communications News, 2007).
  • A hotel with more technologies being utilized will install more security systems than those with fewer technologies.
  • Given the importance of security and privacy at a luxury hotel, this study expects luxury properties to have installed more security systems than other segments
  • Most hotel employees use their property management systems for hotel operations and should be able to check their e-mails.
  • To justify the low response rate, previous studies which have compared response rates of mail and e-mail for surveys were reviewed.
  • The sample obtained in this study represented the targeted sample: over 80% of the respondents were working in hotel operations. Furthermore, the purpose of this study was to explore hotel operators’ insight of technology usage, IT budget, and security measures rather than to confirm existing theories or to generalize the results.
  • The respondents were asked to select from a total of fourteen securities related systems
  • The profile of the respondents revealed that they were experienced hoteliers with more than ten years experience in the industry
  • Fifty-three percent of the respondents reported that they were with chain hotels that would be considered mid-range properties with an average of 175 rooms (median of 107). Over 80% of the respondents reported working in operations, while fewer than 4% reported working in either IT or engineering (Table 1).
  • Nearly 70% of the respondents’ properties did not have their own IT department (69.2% did not have, and 30.8% had their own IT departments, n = 234, missing data = 10).
  • Fifty-three percent of them (n = 244) thought the most important goal for hotel technology would be enhancing the customer’s experience.
  • second identified goal was utilizing technology to help generate revenue (41%)
  • differentiate properties from their competition (20%), to lower expenses (16%), and to increase security (6%).
  • Internet kiosks in the lobby represented the most frequently used self-service technology (36.5%, n = 244), followed by kiosks for airline check-in/board pass
  • With respect to security systems currently in use, antivirus security systems represented the most frequently used security system (92.2%), followed by hardware firewalls, software firewalls, physical security, and encrypted login security systems.
  • intrusion detection was the most frequently identified system (15.6%), followed by vulnerability assessment scanning (13.5%), Internet scanning (13.1%), antivirus (11.5%), digital ID server (11.5%), and nonreusable passwords (9.8%; Table 2).
  • Thus, the hypothesis was supported that there was a linear relationship between the three factors and the adequacy of security systems.
  • The positive standardized coefficient (β) of .389 indicates that there was a statistically significant (p < .001) linear relationship between IT usage (the number of wireless, self-service, and green technologies a hotel was using) and the adequacy of security systems
  • The study revealed certain things of interest, the most significant of which is the need for greater emphasis on IT security among hoteliers.
  • only about 30% of all respondents reported having their own IT departments. Since budget hotel properties are extremely unlikely to have an IT department, it is highly likely that the very large majority of IT decisions throughout the industry are being made by hotel operators for whom IT is not their primary area of concern.
  • Furthermore, the focus of hoteliers for future IT implementations is enhancing the guest experience (53%) and generating revenue (41%). Very few respondents (6%) identified increasing security as a 5-year IT goal.
  • While almost all respondents use information systems as part of their jobs, very few are trained in the development, maintenance, and secure use of these systems.
  • no correlation was found between the respondents’ perceived adequacy of their IT budgets and the adequacy of installed security systems, as adequacy of IT budget did not appear as a significant term in the regression analysis.
  • Nearly 10% of respondents do not have so much as anti-virus protection for their systems, and nearly half do not even take simple physical precautions to protect their IT systems.
  • we note that no correlation exists between the respondents’ perceived adequacy of their IT budgets and the number of installed IT security systems, as the number of installed systems was not a significant factor in the regression analysis.
  • the large majority of respondent properties do not have their own IT departments. Second, the people making IT decisions generally do not have IT backgrounds or training. Third, the large majority of respondent properties have little more than firewalls or antivirus software to protect their proprietary data, and these systems alone are not adequate to meet PCI standards, as they do not take steps to encrypt and protect cardholder data, maintain a vulnerability management program, implement strong access control measures, regularly monitor and test their networks, and maintain an information security policy as required by the Security Standards Council.
  • it is reasonable to conclude that the respondents did not have an adequate understanding of the nature of the IT security hazards facing them for the average property does not have installed systems adequate to meet PCI standards, yet they reported having adequate budgets.
  • In order to adequately protect proprietary data, one must have an understanding of network security, which is an understanding apart from software functionality.
  • Properties with their own IT departments, however, reported that they had a higher number of installed IS security systems than did those properties without their own IT departments.
  • roperties without their own IT departments, in particular, have a less adequate understanding of their IT security needs than may be necessary.
  • This study found hoteliers’ lack of attention to security provision, training in IT, and PCI compliance can place hoteliers at great risk. For example, the cost of a single incident at a noncompliant property could result in the loss of the entire business.
  • It will be useful to examine the reasons why luxury properties are more likely to employ adequate security measures to determine whether this greater use is attributable to better understanding of security issues or some other factor.
  • The study was limited by the nature of online surveys; the response rate was quite low. Future studies could test the proposed research model via paper-based mail surveys to increase a response rate.
  •  
    This article covers a study performed on various hotels to determine management's level of IT knowledge and security implementations in relation to the hotel's IT security budget. The article discusses four types of technology impacting the hotel industry and how management responses to trending technology can affect a business, particularly in terms of a data breach and overall security. The study finds that an alarming percentage of hotel managers are not adequately informed on the risks and procedures of IT management and security, and many do not have proper IT security measures in place despite having an appropriate budget.
1 - 7 of 7
Showing 20 items per page