Skip to main content

Home/ Hospitality Technology/ Group items tagged atm

Rss Feed Group items tagged

Chang Ren

New "ATM" takes old phones and gives back green | R&D Mag - 2 views

  •  
    In the video we had about e-wastes, people cannot really know where their dumped devices would be and most of them are not really care about recycling. This new ATM can collect used devices directly from users and the company which is doing this is definitely certified by government which will follow the laws and recycle them. This machine eliminates the possible that people just dump the devices, because they will be motivated by the value of recycling;. This is not really a cutting edge technology, but the meaning of this is that it can increase the percentage of e-wastes recycling.
  •  
    I think it's pretty sad to see that people would try and take advantage of such a wonderful environmental and economic system. Asides from now being able to turn in your cell phone for monetary value and recycling purposes, you can also donate your used to battered women shelters, I have done this before. Although, the phone would not fully work if there was no service provider, women would still be able to make emergency phone calls should they have to.
melnetra112

McDonald's Big Mac ATM | PYMNTS.com - 0 views

  • McDonald’s has spent the better portion of the last year developing and implementing strategies to bring the global fast-food franchise into the 21st century. Other global competitors have beaten McDonald’s to the punch tech-wise — Starbucks, Domino’s and Taco Bell, for example, are years ahead of Mickey D’s when it comes to ordering online and using digital tools to enhance the consumers’ experience.
  • But the fast-food giant is playing quick catch-up with its in-store tech, mobile ordering and delivery initiatives — and is doing so by taking a page out of Snapchat’s playbook by blending unattended retail with marketing.
  • That’s right. McDonald’s got its hands on a vending machine.
  • ...3 more annotations...
  • the Big Mac ATM will dispense two new sizes of burger — the Mac Jr. and the Grand Mac — free of charge. In lieu of payment, hungry customers will “pay” with their Twitter handles and get a free lunch. The machine will generate a tweet on the user’s account while they eat.
  • First, consumers are drawn in by the hype factor
  • Second, it’s free food.
  •  
    Technology in the Fast Food Industry, McDonald's Big Mac ATM is free, short-term and Customers friendly. This new method of dispensing food to the public is convenient and it help improve guest experiences versus in store production
bbguy09

McDonald's Big Mac ATM | PYMNTS.com - 1 views

  • Between 11 a.m. and 2 p.m., the Big Mac ATM will dispense two new sizes of burger
  • In lieu of payment, hungry customers will “pay” with their Twitter handles and get a free lunch.
  • We’re still pretty far from robot chefs, and restaurants still need human staff to cook and serve the food (not to mention they’re needed to maintain the machines).
  • ...8 more annotations...
  • inexpensive and multifaceted marketing tactic
  • 77 percent of North American customers ages 18 to 34 want or expect mobile ordering at fast-food restaurants
  • 79 percent of consumers agreed that restaurant technology improves their guest experience
  • adding ordering features onto its relatively new mobile app
  • experimenting with delivery
  • self-service kiosk ordering, digital smart menu boards, custom-order options and even table service
  • the company is banking on big tech changes
  • it allows McDonald’s to get its products out there and its tech message across without shelling out big marketing bucks that could be better spent on ramping up its other tech offerings and initiatives
  •  
    McDonald's has consistently been "beaten to the punch" by its competitors regarding the use of technology in its restaurants, and it has shown in an overall 10.4 decrease in foot traffic from its peak. In a cross-promotional attempt to advertise its new menu offerings while connecting with a younger (i.e. Millenial) market to show off their increased technological offerings (e.g. mobile ordering, digital smart menu boards, self-service ordering kiosks, and even delivery), McDonald's set up a Big Mac vending machine in Boston's Kenmore Square that dispensed burgers in exchange for a video posted to the consumer's twitter account. This multi-facted marketing technique allowed them to deliver their tech-driven message to potentially several hundred new consumers for every burger that was dispensed. This is a highly cost-effective marketing strategy that will allow McDonald's to focus its resources on continued development of the tech solutions that the event is aimed at promoting.
delaneyverger

New Point-Of-Sale ADA Lawsuits - Hospitality Business News - 2 views

  • For example, McDonalds was recently hit with a nationwide class action alleging that its new Coca-Cola Freestyle beverage dispensers violate the ADA because their touch-screen interfaces are inaccessible to the visually impaired.
  • The availability of hefty damages in many states increases the potential exposure businesses face. For example, in California, a single violation with respect to a POS device, entitles the plaintiff to a minimum of $4,000 in statutory damages, plus his attorney’s fees and litigation expenses. Potential liability can be overwhelming when these type of lawsuits are brought as class actions.
  •  
    This article discusses how self-service POS systems are now under fire from the ADA for not being accessible to people with disabilities. Most of the lawsuits have claimed that the problems with these systems are 1) they are mounted too high or at angles that are inaccessible for people in wheelchairs, 2) they do provide captions for those with hearing disabilities, and 3) they do not provide tactile feedback for those with visual disabilities. The ADA provides guidance for different types of technology, such as ATMs and vending machines, but has not provided such guidelines for these new POS systems. Because of this, the courts are having difficulty determining how to better enable these POS devices to work for those with disabilities, having to determine what to do for each individual device. Furthermore, these lawsuits pose a big risk to these companies. Businesses need to better evaluate their POS devices in order to make them more user-friendly for all individuals.
Gabriela Moreno

Impact of Individual Differences and Consumers' Readiness on Likelihood of Using Self-S... - 1 views

  • As more hospitality companies use self-service technologies (SSTs), the industry is going through an evolutionary adoption process.
  • To successfully implement and use SSTs, it is important for the hospitality operators to understand the factors that determine both willingness and resistance of the customers on using the SSTs.
  • The results indicate that consumers’ extrinsic motivation had the most significant impact on their likelihood of using new SSTs (e.g., kiosks and touch screen tables for ordering food or other services at hotels, casinos, and restaurants or pools), followed by intrinsic motivation and role clarity.
  •  
    The article, Impact of Individual Differences and Consumers' Readiness on Likelihood of Using Self Service Technologies at Hospitality Settings states that the use of self-service technology is a rising trend across the board. Major hotel chains, resorts, casinos are implementing software that can remember customers, their information, and go beyond current human levels of service performance. However, not everyone is ready for this new age of self-service technology. In their study, the authors explored influential factors related to individual differences and customer readiness on the likelihood of using self-service technologies. Findings supported technologies such as pay-at-the-pump, online travel purchase, ATMS, and other services that have been around for years were highly accepted. On the contrary, new services such as ordering food over the phone and Internet kiosks in bars were preferred by less than thirty percent of respondents. Within the hospitality industry, customers may perceive new self-service technologies as positive but may choose not to use them if they do not understand it or see no clear benefit from it.  To summarize the results, people may just not be ready for the self-service take over. Especially in the early stages, hospitality companies would need to have an employee standing by the new self-service technology to assist customers with their needs. Although a well used self-service system could generate a new revenue stream, particularly when concerning the younger generation, it is essential that managers take into mind the overall level of consumer motivation and readiness to embrace it,
mmoutsatsos

Nail The Basics Of Cybersecurity With Multifactor Authentication (MFA) - 0 views

  • When it comes to the basics of cybersecurity, nothing is so elemental as the password.
  • the simple password has endured as the first and last guardian of consumer and business data. 
  • But with the rise of sophisticated hacking techniques, passwords alone can no longer protect against unauthorized access and security attacks.
  • ...22 more annotations...
  • Enter multifactor authentication (MFA). By adding extra layers of security to a user's login process and requiring they enter two or more pieces of evidence (e.g., factors) to prove they are who they say they are,
  • MFA is a great method for boosting protection against everyday threats like credential stuffing, phishing attacks and account takeovers.
  • 1. Passwords alone are no longer enough to protect against security attacks.
  • it's critical every company apply effective security measures to protect their data.
  • to protect business and customer data, it begins and ends with preventing unauthorized account access.
  • MFA is the most direct and effective way to do that.
  • A familiar example of MFA at work is the two factors needed to withdraw money from an ATM.
  • Your ATM card is the something that you have, and your PIN is the something you know.
  • companies can require all employees to verify their identities with two or more pieces of evidence to prove they are who they say they are.
  • 2. Companies around the world (from Fortune 500s to small businesses) are feeling the urgency to adopt MFA — but a knowledge gap persists.
  • It's imperative companies invest in training employees on how using MFA is essential to securing access to both work and personal accounts.
  • industries in our everyday lives — led by social media platforms and financial services — requiring consumers use MFA to secure their personal accounts, both businesses and employees are normalizing the everyday routine of MFA. 
  • make the connection between security at work and in their personal lives and understanding they're two sides of the same coin.
  • 3. MFA adoption can seem overwhelming, but it doesn't have to be.
  • By recognizing any technical, change management and financial challenges to user adoption, committing to open communication, and providing the resources and training your employees need, any business can conquer that fear of the unknown. 
  • When adopting MFA, prioritize identifying the strongest and most user-friendly authentication method possible for your organization.
  • that means using an authenticator generator app, a hardware security key or a combination.
  • the reality is a large percentage of U.S.-based employees are also consumers with a smartphone in their pocket.
  • on that phone, the employee is already using multiple apps that require MFA.
  • 4. Balance security with ease of use when identifying a preferred authentication method for your organization
  • With options like hardware keys, you often see employees run into issues losing, replacing or breaking them. But a (TOTP) mobile app can be continuously updated in ways that make the MFA process more seamless (e.g, an app that verifies automatically from trusted locations like an employee's home office).
  • authenticator apps on devices like iPhones have the added benefit of extra layers of security at the phone level like PINs and biometrics like Face ID.
  •  
    This article talks about companies transitioning to multifactor authentication as an added layer of protection of cybersecurity.
Rohit Mudgal

Are we really improving technology for hospitality with only IT for ordering service? W... - 1 views

I have few questions in my mind. I would feel happy if someone can answer them since i dont know any experienced professional in hospitality Technology. My email id is rohit.mozotek@gmail.com 1) H...

Technology hotel hospitality solution Business tech

started by Rohit Mudgal on 23 Oct 12 no follow-up yet
Sungoo Kang

Air France and Airbus Undertake Green Commercial Flight :: Airline News Resource - 0 views

  • The (AF6129) commercial flight combined for the first time the use of bio-fuels (50 per cent in each engine), optimised air traffic management (ATM) and efficient Continuous Descent Approach (CDA) to minimise CO2 emissions.
  •  
    This is an interesting article mentioning how airline industry goes green. Air France and Airbus combined the latest Bio-fuel and air traffic management technologies and reduced CO2 emissions in half. Furthermore, Continuous Descent Approach (CDA) is becoming more widespread as a way to reduce fuel burn. It requires significantly less engine thrust and less fuel burn. These green bio-fuel and CDA strategies might make airline companies as sustainable and valuable chains.
Gabriela Moreno

5 pressing hotel security concerns for 2012 - 2 views

  • areas of top concern for 2012, the usual suspects still top the list: information-technology breaches and terrorism, hoteliers said.
  • 1. IT
  • 2. Terrorism
  • ...9 more annotations...
  • 5. Security as taboo
  • 3. Skimmers
  • 4. Liability and insurance fraud
  • A related threat is that of “skimmers,” or devices that catch credit card numbers when consumers use them for payment. The problem primarily is contained to the restaurant industry, but Callaghan is concerned it could spread to hotels.
  • Ironically, one of the main reasons terrorism tops the list is because it has become less of an issue in recent years, sources said.
  • “The greatest business risk, as I see it … is insurance fraud. And it’s the most expensive,” he said.
  • The hot-button issue within the realm of hotel-information technology is mobile and cloud technology.
  • “Liability” as a general label refers to hoteliers being held liable for the acts, which are often criminal, of third parties, the AH&LA’s Callaghan said.
  • “Security” still is something of a taboo in the global hotel industry, said Paul Moxness VP for corporate safety and security at The Rezidor Hotel Group, a Brussels-based hotel management company, with more than 400 hotels and nearly 90,000 rooms in its portfolio.
  •  
    1. IT The hot-button issue within the realm of hotel-information technology is mobile and cloud technology.A company could have tens of thousands of smartphones or laptops in the field at any given point-each a potential gateway to hackers and other criminals. To the problem the core principle is to provide end-to-end data protection with looking at cost and benefit and how it's supports the business. 2. Terrorism Ironically, one of the main reasons terrorism tops the list is because it has become less of an issue in recent years.Hoteliers need to keep their staffs and travelers mindful of possible threats, but they don't want to scare them. 3. Skimmers A related threat is that of "skimmers," or devices that catch credit card numbers when consumers use them for payment.The best prevention measure is to have an investigative team or third party on hand and making that known to employees. 4. Liability and insurance fraud These two related issues can double, triple, quadruple and quintuple corporate insurance premiums in the blink of an eye. The advisement is hoteliers to educate themselves on the issue, consulting with an attorney, if necessary. 5. Security as taboo "Security" still is something of a taboo in the global hotel industry.Hoteliers need to do a better job of "turning on the light" by talking about security openly and regularly at staff and association meetings, and hotel executives should insist their GMs make security a priority
  • ...9 more comments...
  •  
    The first security matter that is brought up in this article is the cloud computing mobile devices on cell phones and laptops. With each device its own danger center of being hacked into a company's systems. The second point is "terrorists." Even though there has not been an issue with terrorists for about 10 years now it is still a big issue. According to the article companies are slacking on being vigilant because of the lack of activity.The third is what are know as skimmers, they are devices that gather information like credit card numbers.The last two issues are liability and security itself. Hotels claim to have security matters under control but when it comes to it, it is for show. Hotels need to buckle down on their security measures.
  •  
    "Terrorism and information technology breaches are familiar areas of concern on hotel security professionals' 2012 to-do lists."
  •  
    This article talked about five important hotel security concerns in 2012. As more and more new technology applied in the hospitality industry, IT professionals now face with challenges and risks associated with the new technology. When asked for the areas of top concern for 2012, hoteliers consider the usual suspects still top the list: information-technology breaches and terrorism. Hoteliers interviewed for this report recommended focusing on t five areas during 2012. The first concern is IT. The hot-button issue within the realm of hotel-information technology is mobile and cloud technology. Hotels have to protect data and information, especially the financial data. The second concern is Terrorism. Hoteliers need to keep their staffs and travelers mindful of possible threats, but they don't want to scare them. Thirdly, a related threat is that of "skimmers," or devices that catch credit card numbers when consumers use them for payment. The problem primarily is contained to the restaurant industry, but it could spread to hotels. The forth is Liability and insurance fraud. These two related issues can double, triple, quadruple and quintuple corporate insurance premiums in the blink of an eye. The fifth concern: Security as taboo. "Security" still is something of a taboo in the global hotel industry. Hoteliers need to do a better job of "turning on the light" by talking about security openly and regularly at staff and association meetings
  •  
    In the top 5 hotel security concerns, number 1 is IT Security. Many businesses now are working off of laptops and smartphones which is making it easier for hackers to get in to and steal information. The same goes for hotels which are becoming more hands-free, eco-friendly which is working off of computers. The hotel industries are spending more and more money on making sure that they are secure from any hackers logging in to their computers to get their guests information.
  •  
    When thinking about hotel security we do not necessarily jump to anything other than terrorism or things like that but in this article it talks about five different things that can be issues in hotel security. IT is a large issue due to mobile and cloud technology. There are so many devices used that it is easy for hackers to get in the system. Terrorism is of course an issue even though it is not so prominent as it has been in the past. Skimmers are becoming more popular in hotels and restaurants having someone working on the inside who swipes the credit card though a machine before processing the payment to take all of the information off of it. Liability and Insurance Fraud can be something as little as stubbing a toe to a large workers comp case. This is the most expensive security issue hotels face. Security is still taboo in hotels because it scares some guests but at the same time once one thing happens all of the bad things will happen. If nothing happens than it will stay like that.
  •  
    This article makes great points that we do not think about as normal people. Before taking this class I would never think of all of these issues that could be happening to me while at a hotel or restaurant but anything is possible.
  •  
    This article really made me think outside the box in order to enhance security, specially when in regards to IT, skimmers and liability/insurance fraud. All too common are people looking for ways to beat the system, we hear about it constantly but don't pay attention. From worker claiming worker's comp, foreign fingers and hazardous items in food, to Publix's ATM being the victims of attached skimmers and hackers attacking sensitive information transmitted by the world wide web. The best solution is to be proactive with training and technology and the benefits of being ahead of the curve.
  •  
    Great Article...hotel security is so important not only for the company but also for its stakeholders and consumers. It is the responsibility of the company to ensure that the correct steps are in placed to ensure guests and company information is secure. At my current job, it is my responsibility to ensure that employees are not utilizing credit card devices to catch customer's credit card information. We also address any possible theft concerns with the employees to ensure these issues are avoided.
  •  
    Great Article- There are so many security issues that we usually don't think about on a daily bases and this article highlights them well. Terrorism is something that has become rather laxed over the the last five years and usually the last security concern in the hospitality industry instead of the first that we process as a true risk. Concerns should also be focus on liability and insurance fraud from both guest as well as employees; a slip and fall and bed bugs can result in costly lawsuits.
  •  
    1. ITAccording to the article, most mobile devices that are used for business are unprotected. Meaning that the devices if the device even have a password and if it does the password is not very complex. There could be thousands of employees accessing company information via the cloud through unprotected smart phones or other mobile devices. This could organizations at risk to hackers and other criminals  2.  TerrorismAlthough terrorist threats are less of a concern nowadays, that does not mean hotel managers should discontinue stressing the importance of security within their establishments. Keeping employees aware and diligent can prove to be a delicate assignment but it is a necessary of part of maintaining a safe work environment in the twenty-first century. 3.  SkimmersSkimmers are devices that steal credit card numbers when consumers use them for payment. Unfortunately, it is most commonly an employee on the inside who is committing the crime.  A third party investigation team will be needed to prove who is stealing from the establishment.  4. Liability and Insurance FraudCombined, these two issues could sky rocket a company's insurance costs through the roof. It is crucial that hoteliers be aware of the legal system and educates themselves on issues concerning liability. Both patrons and employees alike could potentially file claims against an establishment and entitlements can quickly get out of hand.    5.  SecurityDespite the best security measures, there is always the possibility of unforeseen danger. This fear of the unknown is a concern for hotel workers. To confront this fear of the unknown managers must regularly and openly discuss security with employees.  Security should be held as a top priority. 
  •  
    This article discusses five main concerns brought on by the current state of hotel security. I must say that some of this information surprised me. Something that especially surprised me was learning that mobile devices that are used for business hardly use passwords. The article states, "Amplifying the problem is the sheer number of devices, he added. A company could have tens of thousands of smartphones or laptops in the field at any given point-each a potential gateway to hackers and other criminals." This piece of information is very unsettling to me. How could such valuable information not be protected? The article suggests the solution to this problem is PCI DSS. Terrorism as number two on this list also surprised me because that is not something that would first come to mind for me. The article states that it is ironically on the list for becoming less of an issue. I suppose this reminds hoteliers to never let their guard down when it comes to issues of safety and security within the hotel. However, "skimmers" and liability on this list does not really surprise me. The article suggests that hoteliers be educated about these issues to protect the hotel against them.
Carolina Villa

Proximus Mobility Named a TAG Top 10 Innovative Technology Company - 0 views

  • The Technology Association of Georgia (TAG)
  • today announced Proximus Mobility, a hyperlocal proximity marketing software company, as one of the Top 10 Innovative Technology Companies in Georgia.
  • The coveted Top 10 Innovative Technology Company Awards recognize Georgia-based companies for their innovation, financial impact, and their efforts at spreading awareness of Georgia's technology initiatives throughout the U.S. and beyond.
  • ...4 more annotations...
  • “Proximus Mobility’s hyperlocal location based marketing solution is not only changing the marketing and advertising industry, but is also putting Georgia on the map as a state where technology innovation can thrive,”
  • Proximus Mobility and the other group of companies and believe that the community will be just as impressed as we are by their innovation and impact on Georgia’s technology industry.”
  • “Proximus Mobility is a comprehensive hyperlocal proximity mobile marketing solution which not only delivers relevant ad content but also captures consumer behavior profiles that are important to brands,”
  • Based in Atlanta, Proximus Mobility is a location based proximity marketing software company that provides a turnkey, end-to-end solution to digital out-of-home, ATM and kiosk companies, ad networks, retailers, hotels and casinos, venues, advertising agencies and small to medium sized businesses.
  •  
    Proximus Mobility a hyperlocal proximity marketing was recognized as one of the top 10 innovative technology companies in Georgia. This new technology is not only improving the marketing and advertisement of new products and services in the industry, but also is putting Georgia on the map. Proximus Mobility is a location based proximity marketing software that provides advertisements in a relevant high value digital content to consumers' mobile phones when they are near the point of sale.
Alexandra Givner

Visa Europe predicts contactless payments will become mainstream in the UK with 20 mill... - 1 views

  •  
    This article, posted on the Visa website discusses how McDonald's UK plans to implement a new type of payment method for customers. This "cash free" payment methods allows for customers to use only debit or credit cards and pay up to 15 euros. Visa states that it is a quick and easy way for customers to purchase a coffee or lunch at a fast food establishment. As stated in the article, this form of payment helps companies save money with regards to operating costs and improves risk management because less cash is available at the restaurant. In my opinion, I believe this is a quick and convenient way for customers to get in and out of the restaurant - which is essentially what a fast food establishment caters to do. The down side of this new hardware addition to McDonald's is that it may reduce the amount of jobs in each store because the computers will be able to do the work, humans once did.
  •  
    To me this is just a given. Of course contactless payments are going to increase. They already are especially in big cities where everyone is always on the go. I know that I barely ever have cash on me. I end up having to run to an ATM. Paying with cards is the easiest and an fastest way of paying for things.
  •  
    I agree with both comments. I just wonder why they cap the amount to £15, which converts to $19.25. Is that to encourage individual transactions? To clarify, the only thing I can think of is they are trying to discourage people from purchasing for others. But that doesn't really make sense since the purpose of contactless payments is increasing convenience for the customer who wants to make on-the-go purchases and thus increasing profit for the business. Just something I was wondering.
csendra004

Major Fast Food Chains Add High Tech Ordering - QSR magazine - 0 views

  •  
    MODULE 7: This article is about the growing trend of quick-service brands implementing mobile and kiosk ordering for their customers. For major quick-service brands like McDonalds, Burger King etc. they've started to implement self-service kiosks or mobile apps allowing their customers to pre-order their meal and pick it up without waiting in a long queue line. At the base of this ever-growing trend, the trend is very similar to when banks started to provide self-servicing ATMs. According to the article in the next three years most of any quick-service brand that has multiple locations on a regional and/or national scale will have implemented a mobile ordering system within their operations. While taking this into consideration, quick-service restaurants need to be careful in how these mobile apps are perceived by people who isn't using it. Some may think that using the mobile app promotes those people to "skip the line", which can cause some negative feedback. With that said, now these quick-service brands need to satisfy their customers who don't use the mobile app so that they don't feel obsolete for not partaking in the trend before. With this growing trend, these quick service brands will not only have to think about their customers walking in their locations but also for the potential customers that are walking on the streets with their mobile devices.
msbode

Ensuring Software Integrity in IoT Devices - 3 views

  • oT is defined as the Internet of Things. The Internet of Things refers to the ever-growing network of physical objects that feature an IP address for internet connectivity, and the communication that occurs between these objects and other Internet-enabled devices and systems
  • Gartner predicts that there will be 20.4 billion connected Internet of Things (IoT) devices by 2020, with 5.5 million new things getting connected every day
  • more than half of major new business processes and systems will include an IoT component by 2020
  • ...9 more annotations...
  • Manufacturers are rushing products to market with little or no thought to security, often including hardcoded passwords or known vulnerable software libraries. While this problem is most obvious in the consumer space (which gets the most news coverage), vulnerable IoT devices are present in every business sector as well
  • The TPM stores secret keys, passwords, and digital certificates in its secure internal storage protecting them from software and physical attacks. The TPM acts as a root of trust for checking platform integrity at boot time (i.e., check against any malicious change). A cryptographic hash value of the platform configuration is calculated and compared against the precomputed hash value of the platform. Access to the platform is denied if the integrity check fails [4]. This is the beginning of the “chain-of-trust” for software modules that are subsequently initiated. This transitive trust mechanism is one of the important security features in trust computing. It uses the trust root as a starting point to establish a chain of trust model, in the order of trust root, boot loader, OS, and Application.
  • Secure boot provides the foundation for Trusted Boot, which extends the trust boundary to the boot process and eventually the operating system.
  • software attestation attempts to achieve a dynamic root of trust without specific hardware support. This method has the advantage of not requiring any stored secrets (cryptographic keys or passwords) and allows applications or modules to be updated, which may not be possible if hash values are stored in immutable formats, such as a TPM chip
  • While Secure Boot validates the platform and firmware, Trusted Boot is generally defined as verifying each software module before execution and extending the chain-of-trust to the entire operating system. During the boot sequence, the digest of each executing program is recorded before it executes. A TPM (Trusted Platform Module) is used to store all these records and then report on them securely.
  • It is important to note that Trusted Boot requires a TPM chip so the operating system can see the chain of execution, thus it may not be an option for some IoT devices. Lack of trusted boot support would allow an attacker with physical access, or using a software vulnerability during run time, to potentially modify the stored code and compromise the device.
  • There are many other attack possibilities to consider with IoT devices. For example, existing TPM architectures do not support runtime integrity checking and this allows attackers to exploit vulnerabilities to modify the program after it has been verified (at time of check or TOC) but before the time of its use (at time of use or TOU) to trigger unintended program behavior, such as the execution of malicious code or the leaking of sensitive data
  • Physical attack is a viable method of compromising the integrity of a device. Modifying and replacing firmware by an attacker may be worth the effort, depending on the perceived value of the device or the data it may access (such as a video camera or ATM). Attackers can go as far as removing memory and reading its contents.
  • a device built today can become a major problem tomorrow
  •  
    The purpose of this article was to review the available literature on the subject of ensuring software integrity for IoT (Internet of Things) devices, focusing on detecting and preventing modification of the original software, so that the device cannot be used for unintended purposes. The literature reviewed; secure boot, trusted boot and runtime security. Concluding that no one single control is going to adequately protect a device the solution based upon 25 years of experience is to create a multi-layered approach to security that starts at the beginning when power is applied, establishes a trusted computing baseline, and anchors that trust in something immutable that cannot be tampered with. Additionally, because a device built today can become a major problem tomorrow, due to them having hardcore keys "set and forget", the internet will then have literally billions of obsolete hosts in the coming years. Therefore it is important for MIS Managers/ Consultants investigate how to change the game in order to mitigate the damage or economic value of new systems being breached and by asking questions such as 'Can we even in the presence of a malicious attacker offer some limited form of security for the most valuable transactions (such as e-banking) or assets?' and 'Can we make the 'business' of the attackers less attractive by applying security technologies that are particularly tailored towards destroying the business model of the attackers?'
lfreeman128

The Coolest Event Tech of 2017 - 0 views

  •  
    This article explains the newest event technology in 2017. Robotics, Artificial Intelligence and Virtual Reality are some forms of technology that are showing up at events around the country. Some robotics popping up are Make Shakr, a robotic bartender that makes an limitless menu of cocktails and Sprinkles' Cupcake ATM that sells cupcakes 24/7. Artificial Intelligence is being used in voice recognition programs and unmanned vehicles. Apple's Siri, Microsoft's Cortana and Amazon's Alexa are all voice activated assistants that make AI easier to use in events. Gone are the days were virtual reality (VR) uses heavy headsets VR 2.0 allows costumers to walk around activations. Merrell, a footwear company had an industry-first hiking experience that had customers move around a virtual commercial.
shoss003

Speedy Check-In Lets Hotel Guests Bypass Front Desk - 1 views

  • The hospitality industry is moving toward more automated check-in systems
  • “Customers are used to A.T.M.’s at the bank instead of tellers, checking in for airplane flights online, and they are now looking for that same efficiency when they arrive at a hotel,” Mr. Craig said. “No one wants to wait in line for the front desk anymore.”
  • an upset customer posting to Twitter, Facebook or TripAdvisor can easily share bad impressions with a wide group of people.
  • ...8 more annotations...
  • automated check-in was also a plus for hoteliers who wanted to assign additional duties to the front desk staff. “When a guest checks in late at night and the same employee can make sure the check-in goes smoothly and also sell them something to eat,” he said, “the hotel has saved money on staffing, increased its revenue and increased customer satisfaction.”
  • The different check-in methods are meant to provide options for guests, not to supplant any,
  • “Leisure guests here for shopping, dining and culture may want the opportunity to talk with our front desk associates to get some quick recommendations, versus a person here on business who may prefer to check in though the Web or self-check-in kiosk,
  • welcoming, like coming to a friend’s house
  • remove the physical barriers between the guests and the staff
  • hides the technology but uses it to prepare for and personalize each check-in.
  • orientation takes place at the same time as check-in
  • “There’s a lot of preplanning, technology and communications going on behind the scenes, but humans are the most important part of hospitality, so we keep the technology parts hidden
  •  
    This article is giving the reader a look into the new check in procedures being implemented by hotels across the world. This "speedy check-in" allows for guests to by pass the traditional front desk check in and instead opt for check in via kiosks located in the lobby or even checking in before arrival. The automatic check in trend began as a way to relieve guests from having to wait in long lines when arriving at their hotel to check in . The option for speaking with front desk associates is still there but would rather serve as more of concierge, with suggestions on restaurants and questions regarding any leisure activities within the city or hotel itself. Some hotels are also taking the approach of personal greeters who approach the guest upon arrival, making the check in process more like a welcoming into a friends home. Overall I love the idea of being able to bypass hotel lines, especially during holidays when lines tend to get quite long or when arriving to a hotel fairly late in the night. Being able to arrive and head straight to the room allows for smoother check-ins and more efficient use of front desk associates. The personal greeters also provide more of an at home feeling. Guests can feel like they are personally being cared for as opposed to just being another occupied room. 
  •  
    As we move into a technology focused society hotel needs to follow the trend of what travelers want and how to streamline using technology. This article describes how hotels are implimating kiosk in their lobbies to offer their guest a quick and easy way to check-in without having to make the line at the front desk. The hotels goal is to leave the "hotel embassador" and/or front desk for guests that have special requests or questions about their stay. They reference a hotel in Boston that has taken the electronic checkin a step further. They email the guests prior to arriving at the hotel two codes. The first code is to be used at the front door to enter the hotel, and the second code to enter into their hotel room keypad. They interviewed President and General Manager of NCR Corporation's travel business about these types of services. He stated that they offer travelers the same speed and quick services as ATM machines at banks or kiosks at the airport for quick checkin. He went on to say that they expect that type of service when traveling. Mr. Craig even touched on how a travelers feedback is even more important due to social media. One bad review can affect the hotel instantly after they tweet, post, etc. In the article they also interviewed Glenn Haussman, editor of the online trade magazine Hotel Interactive. He stated that with the use of the kiosk and express check-in the front desk staff can offer a more personal experience by doing other tasks. For example they mentioned a late check guest might want a snack or something to relax after a tough flight. By the staff not needing to check them in can go get the guest a coffee, or something to eat; this making the experience feeling more personal. The article states the Hyatt chain has implemented their kiosk in almost all their properties in major cities. They still offer a more traditional check-in as well. They went on to say some chains are using greeters with ipads to check guests in as they ente
dlevine4195

Beacons At Airport: The Next Big Thing In The Airlines Industry - SPEC INDIA - 0 views

  • Beacon technology has the potential to transform curb- to- gate- to- destination passenger experience while increasing the revenue streams.
  • Beacons are a small wireless device that sends Bluetooth low energy (BLE) signals to the nearby mobile device.
  • It interacts with a mobile application installed on the device and triggers specific actions such as displaying a contextually relevant message on the phone, sends coupons of nearby stores, etc.
  • ...23 more annotations...
  • So, in an airport environment, these small BLE devices are connected with smartphones and associated mobile app which helps in indoor way-finding, tracking the movements, predicting & serving traveler’s need, and much more.
  • increase the interactive engagement, beacon technology comes to rescue. It makes the travel easy by connecting with a traveler and delivers personalized proximity information in a better way.
  • Deployment of a beacon at the airport can eliminate the stress of check-in, security, & baggage management and passengers can have more time to enjoy the lounges, cafes and other airport privileges.
  • Beacons installed at the airport can track the movements of the passengers throughout the airport (where they dwell the longest, which airlines is generally preferred etc.) and generates the data which helps to identify the need of the visitors.
  • For instance: If there is any change in the gate when passengers are busy with other stuff, a beacon would ping the respective mobile app with the quick push –notification about the gate information in real-time.
  • In such a scenario, if beacons are deployed, it can help to find the route of bus location, gate and terminals easily with the help of indoor-navigation.
  • Apart from this, indoor-navigation enables passengers to search quickly for nearby airport vendors and services such as restaurants, lounges, shops, ATM locations or family restroom
  • Heat-map helps to understand the user-behavior of the passengers.
  • updates on flight delays, gate changes or baggage collection.
  • beacon can trigger contextually relevant messages, personalized deal (eg: restaurant discounts, Wi-Fi passes, upgrades, etc.) to the passengers who are nearby.
  • Influencing customers with the current offers and vouchers helps to drive customer engagement, increase sales or build brand loyalty.
  • If beacons are deployed near the baggage claim section, they no more have to look out for the electronic board to find at which carousel baggage will arrive
  • A beacon will trigger the message to the arriving passengers about the carousel and will also inform them about how long they will need to wait.
  • beacon solution will drastically reduce baggage loss, increase efficiency and ensure customer confidence.
  • MIA airport official app helps to improve passenger experiences by providing personalized updates, directions, offers based on the location.
  • Virgin Atlantic airlines provide an electronic boarding pass to the premium passengers who have installed iPhone’s Passbook app.
  • Passengers are able to receive messages and personalized notifications from the beacons. Passengers using the service will receive special offers, such as commission-free currency exchange.
  • Terminal 4 with the goal of providing convenient flying experience by displaying actual wait times at major queues.
  • The beacon also helps in resource allocation to segregate the crowd at the terminal.
  • Serves as an effective advertising toolBoost the power of personalizationIncreases app-engagement and retentionEnhance the travel experience by reducing the wait-timesReduces bottlenecks and track the flow effectivelyConnects with a customer at the right timeIncreases the revenue stream
  • Mobile and beacon technology can create a connected experience and engage passengers from a single touch point.
  • Many gates are shared by different airlines. It is not practical for each airline using the same gate to deploy its own beacon.Beacons are connected with mobile apps, so information can be used to determine a person’s location which may result in data privacy issues.Installation is complex which may lead to more cost.
  • The airport can gain valuable insights into passengers, which ultimately helps to achieve business goals through a single piece of technologyPassengers can enjoy more engaging, seamless, and personalized experiences through their ever-present mobile devices.
  •  
    The airline industry has implemented beacon technology for a more personalized and easy travel experience. The article discusses how Beacons are collecting real time information and creating a single touch point experience to get information regarding airports or flights. It goes into detail about the ability of communication with travelers while they are traveling.
1 - 16 of 16
Showing 20 items per page