Skip to main content

Home/ Hospitality Technology/ Group items tagged aws

Rss Feed Group items tagged

ldevaul

Wyndham Hotels & Resorts Selects AWS as Its Preferred Cloud Provider to Enhance Guest E... - 0 views

  • Today, Amazon Web Services, Inc. (AWS), an Amazon.com, Inc. company, announced a global collaboration with Wyndham Hotels & Resorts, Inc., a hotel franchising company, to upgrade its technology infrastructure and develop and deliver new guest services across its 21 hotel brands — including Days Inn, La Quinta, Microtel, Ramada, Super 8, and Wyndham.
  • Today, Amazon Web Services, Inc. (AWS), an Amazon.com, Inc. company, announced a global collaboration with Wyndham Hotels & Resorts, Inc., a hotel franchising company, to upgrade its technology infrastructure and develop and deliver new guest services across its 21 hotel brands — including Days Inn, La Quinta, Microtel, Ramada, Super 8, and Wyndham.
    • ldevaul
       
      This is HUGE!
  • putting it on track to achieve its goal of running 90% of its infrastructure in the cloud.
  • ...6 more annotations...
  • For example, Wyndham will use AWS machine learning to help optimize over 90,000 daily rate changes across its approximately 9,000 hotels to help maximize occupancy rates that vary according to factors such as location, weather, and time of year.
  • xpanding its presence in the cloud will enable Wyndham to focus on growing its core hotel franchise business—seamlessly integrating new properties into its network—while leveraging AWS’s proven global infrastructure to help meet demand where it arises post-pandemic during the peak summer travel season. 
  • In addition, Wyndham will use AWS to develop new digital services for guests to automate check-in and leverage AWS partners to deliver customized offers during hotel stays, such as recommendations on local attractions, restaurants, and entertainment. 
  • Looking ahead, Wyndham will use AWS to remain agile and adapt to rapidly changing guest and market needs with plans to use AWS machine learning to drive demand with greater personalization and more timely and relevant guest offers.
  • “By moving the majority of our workloads to the cloud, Wyndham was able to rapidly respond to the changing business conditions brought on by COVID-19, and now we’re positioned to scale our operations as different parts of the world begin to reopen.
  • “The hotel industry has faced a series of rapid changes recently, yet by running on AWS Wyndham gains the insights and agility it needs to support its franchisees, transform its customer engagement, service, and business models, and remain an industry leader,”
  •  
    This article announces the global collaboration between Amazon Web Services (AWS) and Wyndham Hotels & Resorts Inc. This collaboration is going to allow the Wyndham to upgrade their infrastructure tech and deliver an entirely new way to experience customer service. What I found to be very interesting, besides Wyndham being 90% cloud based, was that AWS is going to help the hotelier develop a new way for guest to automate check-in and leverage AWS partner to deliver customized offers. It will be able to recommend local attractions, restaurants, and entertainment.
kpony001

Cloud security: The reason hackers have it so easy will infuriate you - 0 views

  • hackers time and again have outwitted the cyberguardians.
  • HashiCorp offers an open-source tool called Vault that stores sensitive credentials, encrypted themselves, and strictly limits what people, servers and programs can access them
  • The mass movement of company and personal data to the cloud has only complicated things.
  • ...15 more annotations...
  • Companies have uploaded VPN and cloud access credentials to cloud storage systems that are easily accessible.
  • security breaches are routinely made worse when hackers who enter one system are then finding the keys to another lying around unencrypted.
  • developers are still regularly storing the digital keys to company assets and even user data in source code, configuration files, and other miscellaneous, unencrypted locations.
  • Unlike typical users who can memorize their passwords or store them with a secure password manager, developers and IT workers often need to keep security credentials in places where automated software can find them.
  • Cloud managers are playing catchup to close the door on the critical data left out in the open.
  • Sophisticated new cybersecurity tools designed to securely store these kinds of credentials in a way that legitimate, automated processes can access, and intruders can’t
  • hackers time and again have outwitted the cyberguardians.
  • cloud industry leader Amazon launched AWS Secrets Manager, its own credential management tool. And Microsoft offers what it calls Azure Key Vault to securely store and monitor and control access to this kind of data.
  • The main problem is that companies really don’t have policies for it or they don’t follow up and make sure those policies are followed
  • Until recent hacks made it clear that few organizations can hope to keep their networks entirely free from intrusion, many companies paid less attention to the security of data within their firewalls
  • UpGuard, known for its frequent role in detecting leaks tied to data stored on insecure cloud machines, has released BreachSight, which scours the internet for its clients’ exposed code, credentials, personally identifiable information, and other sensitive data.
  • Since last year, Amazon has also offered a service called Amazon Macie, which uses machine learning to detect unusual access patterns to cloud storage and uploads of potentially sensitive data like access keys.
  • Amazon also released open source software to help prevent accidentally storing passwords and keys to source code repositories
  • other developers have offered similar tools to scrub credentials from existing code.
  • it’s possible that those types of tools will automatically be provided as part of cloud computing contracts, as standard as seatbelts in new cars.
  •  
    Cloud computing has created a very hacking prone storage system because companies have not been paying as much attention to security as they should. Thus, by not taking the logical measures such as not uploading credentials to cloud storage systems, they are becoming prone to hacker raids. However, with the turning of the tide, new methods of security have presented themselves in the form of online tools such as HashiCorp's Vault Microsoft's Azure Key Vault, and Amazon's AWS Secrets Manager, which stores sensitive credentials in very limited access windows, as well as UpGaurd's BreachSight which detects online data leaks containing exposed and volatile client data, and Amazon's Amazon Macie, which learns the access patterns of your cloud storage,
jlewinsky

Learn How Tech-Forward Hospitality Companies are Transforming Via the Cloud | Hospitali... - 0 views

  • a handful of travel and hospitality companies are already turbo-charging their recoveries by adopting agile technology as a key competitive advantage.
  • Amazon Web Services’ must-attend event for everything cloud:  AWS re:Invent
  • Most travel and hospitality companies are slowly migrating to the cloud to save money, facilitate digital transformation and increase access to innovation
  • ...2 more annotations...
  • Moving ahead, Just Eat Takeaway is looking to cloud to facilitate global expansion, streamline operations, and enhance the user experience.
  • adding value to the customer experience, enhancing loyalty, and innovating faster in the midst of an ever-changing travel environment.
  •  
    Amazon web Services or AWS is a cloud based platform created to help the hospitality, restaurant and travel industry. This platform enables companies to save money, increase global expansion, enhance user experiences thereby enhancing customer loyalty.
ealmi001

Top cloud providers in 2020: AWS, Microsoft Azure, and Google Cloud, hybrid, SaaS playe... - 0 views

  •  
    According to the article Top cloud providers in 2020: AWS, Microsoft Azure, and Google Cloud, hybrid, SaaS players, cloud computing in 2020 is more mature, going multi-cloud, and likely to become more focused on vertical and a sales ground war as the leading vendors battle for market share. The COVID-19 pandemic and the move to remote work and video conferencing are accelerating moves to the cloud. Enterprises increasingly are seeing the cloud as a digital transformation engine as well as a technology that improves business continuity. As work was forced to go remote due to stay-at-home orders tasks were largely done on cloud infrastructure.
nbrac002

How Cloud Computing Helped Hotels and HotelTechReport.com Cope with Volatility | AWS fo... - 0 views

  • During the pandemic, the travel industry adopted technology at unprecedented speed and scope to meet new regulations and volatile market conditions.
  • At the heart of every hotel process or SOP there is software that relies on cloud computing.
  • received responses from 657 hoteliers that crystalized the major trends we’ve observed in the market:
  • ...17 more annotations...
  • cost savings is now actually less important to hoteliers than the ability to adapt to rapidly changing business conditions.
  • Historically, hoteliers respond that improving operational efficiency is the most important value proposition for adopting software, but when asked about their goal for hotel technology in 2021, hoteliers said they were adopting new technology solutions to assist in the transformation of business processes and operating models.
  • 96% told us that technology will be more important to their businesses in five years. 91% said that they expect to be using more software tools to run their businesses in 2025 than they did in 2020.
  • Hotels needed to decrease staffing levels while delivering increased, safety-focused levels of customer service.
  • Guests demanded fully contactless experiences for the first time in history.
  • detailed housekeeping protocols.
  • infrastructure and assets went unused
  • ocused on using technology to transform business processes after the events of 2020
  • Cloud computing technology like AWS has lowered the cost of delivery so that hotel operators of any size can access software that was previously only available to major global chains.
  • The cloud allows companies to avoid costly installations. It requires minimal upfront investment and frees up companies to focus on improving their core services instead of server configurations. The cloud also offers companies a pay-as-you-go model so that they can scale up and down their infrastructure in a flexible and cost-effective way.
  • Increasing server capacity without cloud servers would have required us to rush-order new servers. F
  • $5,000.
  • one additional server
  • able to double our server capacity for minimal cost.
  • It adapts to meet evolving business needs.
  • Sometimes they face growing pains and need to rapidly scale infrastructure to meet new demand.
  • hospitality ecosystem can use the cloud’s fundamental scale-up-on-demand model to enable creativity, innovation, and speed.
  •  
    After the pandemic hit in 2020, hotels have had to adapt to a volatile market quickly or risk major losses. This quick adaptation would not have been possible without cloud computing. Based on a Jan. 2021 survey, the vast majority of hoteliers now claim that the most important use of software is to have the ability to adapt to rapidly changing business conditions- a shift from the historical answer of efficiency and cost savings. What is clear is that without cloud computing, hotels would not be able to meet guests' evolving needs while navigating an ever- changing travel market.
jbrit055

Cloud Computing: Explained for the Hotel Industry - 7 views

  • if you want a more efficient, streamlined back office and happier guests, then “the cloud” can help you meet your goals
  • cloud-based applications are usually a lot cheaper than traditional systems.
  • cloud computing is when you use programs, store files, or access data via the internet rather than on your hard drive.
  • ...25 more annotations...
  • When an application is “cloud based” it means that it lives on third party servers.
  • Avoids costly and painful installations
  • Eliminates negative depreciation (in fact, the software gets better with age, since updates can be made at any time) 
  • Pushes software companies to consistently earn customer loyalty with innovation and great service
  • No discussion of cloud computing in the hotel industry would be complete without mentioning Cloudbeds, the first property management system startup in years to serve 1 million beds with its software.
  • Hotels that use Cloudbeds log into it directly in a web browser like Internet Explorer or Chrome. This is a big advantage for hotels because you can access the application on any device.
  • When a system is cloud-based, it can innovate faster because changes can take effect immediately.
  • Implementing cloud-based software can make your operations more efficient, save time for your employees, and create more positive guest experiences.
  • Another reason for Cloudbeds’ rapid growth is that their software can easily integrate with other tools. Cloudbeds has an extensive marketplace of integration partners, including Whistle, TrustYou, and Oaky, that it can connect to via an API. Because everything is located in the cloud, a hotel doesn’t need to download any programs or plug-ins to add a new integration. These add-ons can offer upgrades and analyze reviews, among other things, so you can improve guest service and even earn incremental revenue.
  • if you want a more efficient, streamlined back office and happier guests, then “the cloud” can help you meet your goals
  • if you want a more efficient, streamlined back office and happier guests, then “the cloud” can help you meet your goals
  • Implementing cloud-based software can make your operations more efficient, save time for your employees, and create more positive guest experiences.
  • “The cloud” wasn’t created overnight; instead, decades of technological evolution led to cloud computing.
  • Requires minimal upfront investment
  • a cloud based hotel software company like Cloudbeds might choose to rent space with a company like Rackspace to host their application (and yours) or alternatively they might use a service like AWS. 
  • One of the biggest misconceptions about cloud computing is that files and applications don’t live on physical storage servers.
  • AWS tends to be more scalable for fast growing applications but as end users your guests won’t notice the difference so it’s really a matter of preference.
  • If you’ve ever edited a Google Doc or uploaded files to Dropbox, then you’ve leveraged cloud computing.
  • If you use Microsoft Office, you might create a PowerPoint on your laptop (local storage), but when you save the file, it gets uploaded to your Microsoft OneDrive, which is housed in the cloud.
  • Benefits of Cloud Computing
  • lower switching costs for buyer
  • you can sign on securely via any web browser - even if you’re off-site.
  • t the same time, users can submit feedback to Cloudbeds about any bugs or glitches, which the Cloudbeds team can resolve quickly.
  • you may even save some money in your IT budget
  • your hotel can implement a new system seamlessly
  •  
    Cloud computing offers a more efficient way for hotels to keep up with data and programs for their company. When a hotel uses cloud computing, they are able to create more of a positive experience for their guests. It also is extremely helpful to use a cloud-based system because hotels could access their cloud-based application on any device. Cloud-based software also gets better with age because the updates can be made at any time so this will get rid of negative depreciation.
  • ...5 more comments...
  •  
    cloud computing is when you use programs, store files, or access data via the internet rather than on your hard drive One of the biggest misconceptions about cloud computing is that files and applications don't live on physical storage servers. When an application is "cloud based" it means that it lives on third party servers. Cloud computing provides several advantages over traditional computing: Avoids costly and painful installations Requires minimal upfront investment Allows software companies to focus resources on R&D/innovation Eliminates negative depreciation (in fact, the software gets better with age, since updates can be made at any time) Offers the ability to cancel at any time (plus has lower switching costs for buyers) Pushes software companies to consistently earn customer loyalty with innovation and great service integrate with other tools...These add-ons can offer upgrades and analyze reviews,PIE revenue management tool, a channel manager, a booking engine, and more operations more efficient, save time for your employees, and create more positive guest experiences
  •  
    This article explains what cloud computing is, the evolution behind the technology, and how the hotel industry uses cloud computing. Cloud computing can benefit hotels because they can use any device to log into cloudbeds on web browsers.This type of technology can make everyday operations more efficient, save employee time, and create an overall positive guest experience.
  •  
    This article explains what we've learned of Cloud Computing. The evolution to its upcoming may have taken a while but now it is here to stay. The use of Cloudbeds in the hotel industry has made operations more efficient, save time and money on employees and improves guest experiences. Cloudbeds has expanded its property management system to include: PIE revenue management tool, a channel manager, and more. The use of Cloudbeds is accessible through any web browser, this makes it efficient if you were working at home. Cloud computing is the next innovation we will see more of in the hospitality industry.
  •  
    This article introduces you to cloud computing and its evolution. It also explains how the hotel industry can benefit from using cloud services. "Implementing cloud-based software can make your operations more efficient, save time for your employees, and create more positive guest experiences." Through the use of CloudBeds, a hotel employee can sign on and use property management software securely from any web browser.
  •  
    This article talks about the use and benefits of cloud based software for the hotel industry. It gives a simple explanation of how the cloud works. The major point that I found interesting is the usage of this software and how it is easier for hotels to stay up to date because any update in the system happens in real life at the moment without having to update individually every terminal
  •  
    The article discusses the hotel industry's adoption of cloud computing. By using cloud computing, you can use programs, upload files, and access data over the internet instead of storing them locally. Cloud computing and local storage are used together in some applications. In addition to hardware, software, training, and maintenance, IBM offered an extensive range of services. Due to Cloudbeds' ability to integrate with other tools, they have experienced rapid growth. Integrations can offer upgrades and analyze reviews, among other things, so you can provide better service and increase revenue. By implementing cloud-based software, hotels can stay ahead of the competition, save time for employees, and give their guests a better experience.
  •  
    This article describes what cloud computing is, and what it isn't, so people understand how it can be seen in the industry. The storing of data on the internet has been a huge innovation as it expanded storage beyond the typical storage offered on a device. By switching to this new technology, businesses may minimize future investments as the technology tends to work for many years and only requires quick updates. By researching what your business and customers need, you can make the right choices on whether this investment is worth it or not for your property.
Adison Heyne

Cloud infrastructure: Three views from the IaaS sharp end | ZDNet - 0 views

  • With its promise of lower costs and greater flexibility, infrastructure as a service (IaaS) already accounts for the largest single area of cloud spending.
  • Others, such as the Kempinski Hotels group, are for the moment progressing through an interim phase, with a considerable amount of infrastructure provided by the cloud but with the rest remaining on premise.
  • The proposed model consisted of concentric levels of security with a highly secure environment at its centre, which only AWS services can talk to. The next level was only accessible to AWS and the Geneva corporate office with its 10-strong IT department, with a subsequent level for the hotels, followed by a level for public access for web services and third parties.
  • ...4 more annotations...
  • The answer was a Vyatta redundant soft firewall that allowed Ward to create a VPN tunnel from all the Kempinski properties.
  • Action for Children's decision to move the web operation onto Rackspace's Open Cloud is designed to solve online scalability issues, but also offers the charity a chance to shift some of the massive datasets of customer, donor, fundraiser and foster parent information to the cloud.
  • "We need to be able to do these analyses when they're needed. This is where the cloud really comes into its own and delivers in terms of cost savings. It means people can still use the infrastructure and the fundraising CRM system, but we can run major pieces of analysis without impeding other people's workloads or slowing down our internal network."
  • "Stick something together on a cloud instance, test it and see if it works. No, it doesn't, drop it, pull something else out — the amount of time to set it up is less, the amount of money spent on putting it together is less," he says.
  •  
    This article looks at the growing trend of the cloud system. You hear the opinions from a few different companies in varying industries on the trending system and how they are implementing the cloud system. Some of these companies are slowly moving towards a total cloud infrastructure, but none of them are fully there quite yet.
Alejandra Kravets

11 new hotel wonders - CNN.com - 0 views

  • The 11 hotels on our list all opened within the last four years, and each is an example of awe-inspiring design in its own right.
  • Yas Viceroy Hotel (Abu Dhabi) This 499-room hotel was the first to be built straddling a Formula 1 racetrack
  • The structure consists of a pair of 12-story towers joined by a sweeping, 700-foot curvilinear skin of glass and steel -- actually 5,800 pivoting, diamond-shaped glass panels that reflect the sky by day and are illuminated up by an LED system at night.
  •  
    This article emphasizes the importance of building structure in 11 Hotels around the world. How customers are attracted and willing to pay to stay in this unique hotels based on their inspiring architecture. Seven out of the 11 hotels are under $200 a night! The famous Marina Bay Sands in Singapore just opened in 2010, this trio of 55-story towers consists of 2,561 hotel rooms, plus a casino, museum, convention center, waterfront promenade, shops and restaurants. The towers are connected at the top by the cantilevered, two-and-a-half-acre SkyPark, home to gardens, 250 trees, a public observatory and a 492-foot swimming pool -- all perched high in the sky like a fantastical cruise ship forever suspended in midair
Omar Shalaby

Wounded Iraq vet ordered to remove Marine dress jacket at security screening - 0 views

  •  
    Courtesy Patricia Martin Retired Marine Cpl. Nathan Kemnitz during a TSA screening at the airport in Sacramento, Calif. A wounded Purple Heart Marine's humiliating experience at a security checkpoint in California has left supporters and an assemblyman outraged. The extra scrutiny faced by Marine Cpl.
  •  
    I have an awful lot of respect for the military. In this situation, I am thankful that TSA was following protocol; however, I wish they had a little different of a procedure. They could have taken him into a screening room instead of publicly embarrassing the Marine. I don't quite understand how we can embarrass him one minute, while he is on his way to being honored for his service. They also mention in the article a wounded vet that had to remove his prosthetic legs. Again, please take him into a private room to do so. The pain and embarrassment the soldier went through to have that kind of an injury and to deal with it on a daily basis is more than enough. He or she shouldn't have to face those challenges in public as well.
yuqiongliang

Why Switching to a Cloud-Based PMS Could be a Good Idea | Hospitality Technology - 0 views

  • Very few hotel owners found their way home to the Cloud.
  • That means that approximately 70% of hotels still run operations on an on-premise PMS.
  • he amount of time taken for migrating to a cloud system is somewhere between 15 days to a month. When it comes to historic data, it can be easily saved and used for predictive insights.
  • ...6 more annotations...
  • Cloud systems mostly sell on a subscription basis and don’t include any maintenance costs.
  • many hotel chains and larger franchises have not yet taken to the cloud. Instead, the majority of hotel cloud users are the smaller and mid-range independent hotels.
  • cloud PMSs are generally super easy to learn and are designed thoughtfully. With clear and easy guidelines on how to perform tasks and usually dedicated account managers, the whole experience of maneuvering around the product is simplified.
  • With the number of organizations trusting their data with server services like AWS, Microsoft Azure, IBM cloud and even Google, you can rest assured that your data is in good hands
  • Certain cloud systems enable integrations to various third-party hospitality tools like channel managers, revenue management systems, ERPs, accounting and reputation management systems to name a few.
  • Cloud systems ensure that all these tools function in a well-controlled ecosystem and in sync with each other. It can also boil down to personal preference.
  •  
    Here are 8 common questions and concerns among hotel executives wanting to know more about the use of cloud computing at their property.
bbast007

Trends in Tourism Research - 0 views

  •  
    This article outlines how the study of tourism as an academic field has grown tremendously and experienced rapid changes. The author selected twelve major tourism journals for the research. The twelve journals received a mean quality rating above 3.0 and represented a range of importance ratings. The most frequently published topic area Tourist/Visitor Studies showed the greatest growth during an eleven-year period. The majority of articles used quantitative research designs. A much lower proportion of articles took a qualitative or mixed method approach and the remainder were review of theoretical articles. This study has tracked the rise and fall of various research topics and approaches within the broad area of tourism. It suggests that as the field has grown, research approaches and locations have become more diverse, although there is still a need to challenge some of the established and traditional methods.
bbast007

Tourism Strategy Making: Insights to the Events Tourism Domain - 0 views

  •  
    The Primary aim of this research was to undertake a qualitative study of how public sectors events developing agencies in Australia determine strategies to foster events tourism and the stakeholder orientations they adopt in shaping these strategies. Events tourism has been described as the planning development and marketing of events as tourist attractions to maximize the number of tourist participating in events as either primary or secondary attractions. A strategy is an integrated set of policies and programs intended to achieve the vision and goals of the organization or destination. For this investigation, three different framework of events tourism strategy making depicting alternative stake holder orientations were created. They include: * The corporate market-led framewook * The community destination framework * A synergetic framework The reactive-proactive model of strategy making employed by Australian event agencies appeared to be associated with Corporate market-led strategy making.
vanessavioli

Choosing the right IT and cloud services provider post-Covid: A guide - Cloud Computing... - 1 views

  • Now, as most economic indicators begin to trend positive, companies are once again ramping up their IT projects. Long term solutions are necessary at the scale required for sustained operations and cost effectiveness.
  • In this article, we look at three options – IT consulting firms, IT outsourcing companies, and cloud systems integrators
  • There’s also the reality that many of the larger consultancies really aren’t positioned to efficiently or cost effectively help organisations implement necessary IT strategies. Their areas of expertise lie in assurance services, taxation, management consulting, advisory, actuarial, corporate finance and legal services, to name a few.
  • ...12 more annotations...
  • They may have the staff to take on something like a cloud migration or cloud-native application development project. But technology implementation is not a strategic part of their business, so they aren’t necessarily eager to take on these types of projects — particularly if they aren’t of a scale that would allow them to make a sizable profit.
  • They have to rely on proven, repeatable methodology to remain efficient — even if it’s at the expense of better project outcomes for their customers.
  • Companies that specialise in IT outsourcing aren’t faring much better than the big consultancies. While they may be more cost effective than a large professional services provider or consultancy, many potential clients are becoming hesitant about working with them.
  • That’s not to say there still isn’t a place for the large technology consulting firms or IT outsourcing companies. But for companies that want the flexibility, scalability and cost benefits that cloud services provide, working with a company specialising in cloud technologies – as a true, long-time strategic business partner, rather than just a point-in-time technical resource – may be the optimal solution.
  • A viable option may be to go with a mid-sized company that specialises in technology implementation — particularly in the areas of cloud migration and cloud-native app development.
  • Cloud systems integrators are able to be more innovative than larger companies that have no wiggle room for experimentation or exploring new methodologies.
  • These companies develop solutions that can meet current requirements and adapt as those new requirements emerge. For many, their work for a customer is just the beginning of a much longer partnership that will evolve to help that customer continually leverage cloud technologies to meet changing needs.
  • However, many of the cloud-centric companies have chosen to focus their efforts on specific platforms, such as Amazon Web Services (AWS) or Microsoft, enabling them to gain familiarity with and expertise in the many tools and services those particular platforms offer. They can effectively leverage those resources to help their customers implement targeted, effective solutions.
  • Like the large technology consulting and professional services companies, the IT outsourcing companies also tend to rely on standard processes that can be repeated over and over to keep costs down. There’s no room for innovation.
  • Pandemic or not, hiring a big-name IT consulting firm often comes with an equally big price tag. Forgoing work with these higher-priced companies or simply cancelling projects reduces expenditures.
    • vanessavioli
       
      Cost is something that is a very serious part of any technological consideration by management. Will that investment be worth it in the long run and pay for itself. Smaller businesses cannot afford a misstep.
  • Few, if any, industries escaped the effects of the Covid-19 pandemic. Even in the technology sector, where change is a normal part of business, many professional services and technology consulting firms struggled to cope with the disruption.
    • vanessavioli
       
      COVID-19 was/is the ultimate disruptor. It affected every single industry, but affected the hospitality industry in the most profound ways.
  • Yet another potential downside: larger firms tend to be less agile than their smaller counterparts. While they sell innovation to their customers, they are often too big and cumbersome to embrace the new ways of working and thinking that they promote on the consulting side.
    • vanessavioli
       
      It is interesting that it actually takes larger businesses to adapt to new technology, however once again it must come down to cost. Revamping a large company technologically is extremely costly and a very long complicated project.
  •  
    This article provides insight on three various types of IT providers and there methodologies. It definitely emphasizes the benefits of specialized companies that focus on cloud computing as their IT service and business model and their ability to b=continually adapt to the changing environment and their desire to create long term relationships. It also talks about how larger IT companies are more focused on strategy rather than implementation of systems. It also talks about how the larger IT companies are much more focused on their own profit than providing services to the client and how cheaper off shore IT companies basically provide the same services at a lesser quality
jessicahoyos

Physical Structure of Management Information System - 0 views

  • The physical components of an MIS include hardware, software, database, personnel and procedures
  • Related How to Create a Master Calendar Learn More → A management information system (MIS) is an organized combination of people, hardware, communication networks and data sources that collects, transforms and distributes information in an organization
  • Important components include the central processing unit, input/output devices, storage units and communication devices.
  • ...4 more annotations...
  • For users of MIS it is much more important to understand the software than the hardware. Software maintenance can take 50 to 70 percent of all personnel activity in the MIS function. When the organization moves to implement an advanced information system the hardware and software environment becomes more complex.
  • The database improves efficiency of storage by elimination of redundant files and improves efficiency of processing by providing all required data in a single file rather than separate files.
  • Three types of procedures are required for an MIS to operate effectively: user instructions, instructions for input preparation and operating instructions for MIS personnel who maintain the MIS.
  • The quality of MIS personnel is a key factor in its effectiveness. An MIS manager needs a combination of both managerial and technical skills.
  •  
    This article describes with components of an MIS, specifically the physical ones. It explain what each component is used for and how they differ. I think this is important to understand first, to understand the purpose the hardware, software, database, personnel and procedures.
kmill139

Why the U.S. is Terrible at Recycling Electronics | Digital Trends - 0 views

  • E-waste in the United States is out of control.
  • You may assume America has to at least be on par with the rest of the first world when finding a forever home for computers, phones, and printers, but you’d be wrong.
  • The current level and effectiveness of e-waste recycling depends on which state you live in and whether or not you trust locals to “do the right thing.” The hope for improvement sits with congressional reps, state lawmakers, manufacturers, and gadget freaks (yes, you).
  • ...31 more annotations...
  • Others go belly up, leaving behind millions of pounds of old gadgets piled in mountainous heaps atop land which has lead levels many times normal.
  • You’re probably not screaming into a paper bag about the $20 billion or so of gold that’s trashed in electronics every year worldwide. Precious metals come and go. But if you care about the soil that comprises the land of the brave, you should start thinking about what happened to last year’s smartphone (even if it’s just sitting in the garage).
  • This list of reasons isn’t exhaustive, but serves as a solid starting point for understanding the United States’ e-waste dilemma and what can be done.
  • U.S. e-waste recycling laws are often outdated or nonexistent
  • Only 25 states (plus Washington, D.C.) have legislation that addresses e-waste recycling. The other 25 don’t have comprehensive programs, and don’t report what happens to the electronics beyond occasional voluntary numbers, says Jason Linnell, head of the National Center for Electronics Recycling (NCER). Federal laws don’t explicitly address e-waste recycling.
  • The U.S. isn’t good at recycling
  • Those millions of old motherboards and TVs consoles rotting in landfills and warehouses aren’t just eyesores. They amount to a massive health hazard. While electronics waste comprises only 2-3 percent of America’s solid waste stream, the lead, cadmium, chromium, and other materials in aging circuitry account for 70 percent of the hazardous material in landfills, according to an EPA report.
  • Single-stream recycling hasn’t helped
  • Between 2005 and 2014, single stream recycling programs increased from 29 to 80 percent in American towns and cities. During that same time period, material contamination rates increased from 7 to 25 percent.
  • E-waste legislation regularly disappears in Congress
  • This is not the first Congressional session in which similar bills have been introduced and allowed to die like a first grade classroom goldfish on summer break. SEERA currently sits with the house’s Foreign Affairs Committee. Why is it so tough to pass e-waste legislation?
  • The U.S. is an environmental rogue
  • As of late 2018, 186 states and the European Union have ratified it and follow its legal framework. The United States has signed the Basel Convention, indicating an intent to ratify, but is the only developed nation that hasn’t actually done so, which
  • After the initial Basel Convention was adopted in 1989, many organizations said the treaty didn’t do enough to address the disposal of waste from first world countries into the developing world, and pressed for an update, which eventually became 1995’s Basel Ban Amendment. The tweak — which was attacked by many industrial powers, including the U.S., Canada, and Japan — needed three decades before it was accepted by enough countries to go into effect. In August 2019, Croatia became the 97th country to ratify it, which transformed the updated stipulations into international law in December 2019.
  • Federal attempts at regulation have stalled, been killed
  • EPA regulations are incomplete
  • U.S. pushes back against international efforts
  • As a part of the 2003 Waste Electrical and Electronic Equipment Directive (WEEE Directive), the public was guaranteed free recycling services, and conveniently located collection centers. Around the same time, the EU also passed the Restriction of Hazardous Substances Directive (RoHS), aka the “lead-free directive,” which restricts the use of several toxic materials in the manufacture of circuitry and electronic products.
  • In Japan, the Association for Electric Home Appliances requires consumers to help pay for the processing of their goods and manufacturers to set up recycling programs. Electronics recycling has been promoted as such a point of national pride — because Japan is both a huge consumer of gadgets and the country has few indigenous precious metals — that there’s serious talk of making the 2020 Tokyo Olympic metals out of recycled materials. An estimated 80,000 cell phones need to be pulled apart and picked over to complete the plan.
  • State-level e-cycling programs are uneven
  • Certified e-cycling programs are important, but also confusing
  • If you’re the compliance officer who has to make sure the company’s used servers don’t wind up getting tossed in an Indonesian landfill, and you won’t have to nervously answer questions in a “60 Minutes” exposé, you probably want to get that e-waste removed by a disposal team with one of these
  • That all sounds great until you listen to Puckett, who helped create the e-Stewards protocols. He’s one of several people who took part in the development of R2 for over two years and then refused to continue when the proposed guidelines seemed to be too tainted by lobbyists, including ones at the Institute of Scrap Recycling (ISRI), an organization that favors a free market approach over regulation. Puckett and 13 recyclers created e-Stewards, which describes itself as the “the cleanest, most globally responsible standard for e-waste recycling.” He points out that the R2 certification still allows recyclers to export to developing countries. E-Stewards’ doesn’t. R2 recyclers can drop toxic e-waste in landfills or incinerators in the event of “circumstances beyond their
  • Scrap recycling lobby doesn’t like regulations
  • The announcer proudly explains e-cycling is a vibrant industry that adds 20.6 billion to the U.S. economy and supports 45,000 jobs domestically, “safeguarding our environment,” along the way.
  • Can anything be done? Possibly
  • Recycling isn’t the only answer for fewer landfills filled with decaying circuits. Chris Wellise, Chief Sustainability Officer for Hewlett Packard Enterprise (HPE), which installs and recovers tech, emphasizes the importance of designing products for longevity, disassembly, and reuse.
  • “On average, 85 percent of the environmental impacts can be addressed in the design phase,” estimates Wellise.
  • Similar challenges exist for smartphones. Review IFixit’s guide for repairability and you can expect the phones that are easy to disassemble are also easier to refurbish or scrap. In an unusual display of transparency, eco-minded electronics company Fairphone sells spare parts on its site and has visual cues printed on the pieces to help novices figure out where everything goes. In case you’re wondering, it’s possible to make a Fairphone work in America, but most of the company’s sales are in Europe.
  • In 2018, Apple gave birth to Daisy, a robot that can disassemble 200 of the company’s phones in an hour — 1.2 million a year. The company has an installation of the machine in Austin, Texas, and another in the Netherlands. Daisy’s supply chain of used products comes from the company’s in-store trade-in program and a partnership with Best Buy.
  • Pretty awe-inspiring, right? Keep in mind that Apple sold over 217 million phones just in 2018 and has moved 2.2 billion iPhone units since the product line launched in 2007. The two Daisy divisions aren’t even working at capacity. Apple is willing to license the robot technology so any company can use it to disassemble phones, but none have approached them yet.
  •  
    "Maybe it's easy to ignore the huge percentage of vintage gadgets that wind up torched in dicey scrap heaps in developing countries". This article was written on Feb-27-2020. The problem we saw on the old video is still very much a problem now, only bigger.
  •  
    This article was super informative in the realm of E-waste. It covered every aspect of the issue and most definitely is relevant in today's world.
teresastas

Railroads say they don't need cybersecurity mandates - The Washington Post - 0 views

  • The Biden administration plans to impose new cybersecurity mandates on railroad and rail transit systems.But a leading railroad association insists it's already voluntarily following the practices that are now going to be required by the federal government.
    • teresastas
       
      Biden administration is planning on imposing new cybersecurity mandates on railroad and rail transit systems. This includes passenger rail systems like Amtrak and large subway systems like those in New York. Homeland Security Secretary announced the new proposed regulations under TSA eelier this week. The new regulations came as a surprise to the rail industy who feel that they are already taking cyber security seriously and don't need the government's heavy hand involved. They have three day's to submit feedback.
  • Our freight rail system is essential not only to our economic well-being, but also to the ability of our military to move equipment from ‘fort to port’ when needed,” the secretary said at the virtual Billington Cybersecurity Summit, where he announced the intended new regulations.
    • teresastas
       
      We often forget about Rail when we think about Transportation but it is essential for our military and for our major cities like New York. As well as the transport of goods across country.
  • In fall 2020, ransomware hit the Southeastern Pennsylvania Transportation Authority, which operates Philadelphia’s transit network. And in April, a hacker group believed to be linked to the Chinese government breached the computers of the Metropolitan Transportation Authority (MTA), which operates New York City’s subway system — the country’s largest.
    • teresastas
       
      We often don't hear about the hacks that aren't successful but how awful would it have been if hackers would have breached into MTA and taken over NYC's subway system!
dlevine4195

How 9/11 changed air travel: more security, less privacy - 0 views

  • The worst terror attack on American soil led to increased and sometimes tension-filled security measures in airports across the world, aimed at preventing a repeat of that awful day.
  • The cataclysm has also contributed to other changes large and small that have reshaped the airline industry — and, for consumers, made air travel more stressful than ever.
  • Transportation Security Administration, a force of federal airport screeners that replaced the private companies that airlines were hiring to handle security.
  • ...14 more annotations...
  • The law required that all checked bags be screened, cockpit doors be reinforced, and more federal air marshals be put on flights.
  • Things that clearly could be wielded as weapons, like the box-cutters used by the 9/11 hijackers, were banned. After “shoe bomber” Richard Reid’s attempt to take down a flight from Paris to Miami in late 2001, footwear started coming off at security checkpoints.
  • Clear, which recently went public, plans to use PreCheck enrollment to boost membership in its own identity-verification product by bundling the two offerings
  • The long lines created by post-attack measures gave rise to the PreCheck and Global Entry “trusted-traveler programs” in which people who pay a fee and provide certain information about themselves pass through checkpoints without removing shoes and jackets or taking laptops out of their bag.
  • , PreCheck asks people about basic information like work history and where they have lived, and they give a fingerprint and agree to a criminal-records check.
  • Privacy advocates are particularly concerned about ideas that TSA has floated to also examine social media postings (the agency’s top official says that has been dropped), press reports about people, location data and information from data brokers including how applicants spend their money.
  • Each new requirement seemed to make checkpoint lines longer, forcing passengers to arrive at the airport earlier if they wanted to make their flights.
  • The TSA is testing the use of kiosks equipped with facial-recognition technology to check photo IDs and boarding passes rather than having an officer do it.
  • co
  • “TSA is an effective deterrent against most attacks,”
  • This summer, an average of nearly 2 million people per day have flowed through TSA checkpoints.
  • “They are there for my security. They aren’t there to hassle me,” Gathings said of TSA screeners and airport police.
  • Those incidents highlight a threat that TSA needs to worry about — people who work for airlines or airports and have security clearance that lets them avoid regular screening.
  • “All those folks that have a (security) badge, you’re right, many do have unescorted access throughout an airport, but they also go through a very rigorous vetting process before they are even hired,”
  •  
    After the terrorist attacks of 9/11 was when the TSA was created. Ever since this point in history security in airport sis a lot stricter and requires certain documentation to travel. Lines are longer, leaving travelers to arrive for their flights earlier. Overall, 9/11 heavily impacted the security world we live in today.
dlevine4195

Normal 2.0: how a tech-first response is shaping the travel & hospitality sector | Hote... - 2 views

  • launch of the iPhone in 2007. While that’s not a hospitality-specific development, it changed everything about the way people want to travel.
  • billions of people could make restaurant reservations from their pockets. They could leave their room and have an interactive map through a new city, with the ability to keep in touch with their family and coordinate with friends.
  • it’s incredibly advantageous for hoteliers and travel professionals to keep abreast of the technological advancements that will set higher standards for the new hospitality normal.
  • ...11 more annotations...
  • , virtual ID verifications can be built into booking platforms, integrated apps can grant access to digital room keys and enhanced biometric technologies have the power to supplement (or eventually replace) the traditionally awful pre-flight screening process.
  • many travel and hospitality professionals are investing in VR-based marketing to spike interest in their offerings.
  • VR tours are being offered all around the world to spike interest in sights and tourist destinations, making people want to see the sights for themselves
  • VR marketing will soon emerge as the smartest strategy for connecting with consumers; high-budget commercial spend and other digital marketing tactics will be rendered obsolete when any prospective traveler could put on a headset and instantly be transported to the shore of a beach.
  • hoteliers and vacation destination economies invested in virtual reality offerings to extend their experiences beyond the travel restrictions, offering travelers a temporary at-home substitute.
  • It will diminish both consumer wait times and consumer-staff interactions, allowing professionals to reserve their time and focus for more complex guest and traveler needs.
  • investments into biotech need to be paired with cybersecurity and infrastructure that protects a guest’s identit
  • Today, guests and travelers understand quality in terms of fast response times, consistency across channels, and intuitive, self-directed use.
  • eople show a preference to manage smaller tasks on their own; a study by Zebra Global Hospitality showed 70% of guests preferred a smartphone check-in for efficiency and speed.
  • Airline safety once meant extensive processes at TSA, but consumers and professionals are quickly coming to trust the powers of biotechnology, changing the way we think about screening.
  • looking for that service in different ways—on their phones, at their fingertips, and behind the scenes.
dnune013

EXCLUSIVE Amazon considers more proactive approach to determining what belongs on its c... - 1 views

As we discussed cloud computer throughout this module, many of us have mentioned that their places of work within the hospitality industry utilize cloud computing for data storage and in their dail...

cloud computing amazon

anaferia

The biggest cyber attacks of 2022 | BCS - 0 views

  • In a year of global inflation and massive rises in energy costs, it should come as no surprise that the cost of a data breach has also reached an all-time high.
  • average total cost of $4.5m
  • Amongst the 550 companies that IBM contacted that had experienced a data breach, a disappointing 83% had experienced more than one in the same period
  • ...9 more annotations...
  • common attack vector remains credential theft (19%) then phishing (16%), misconfigured cloud (15%) and vulnerabilities in third-party software (13%).
  • Russia has, for many years, attacked Ukrainian infrastructure such as power grids, internet infrastructure and banks. Since the outbreak of physical hostilities, this has extended to systems related to government administration and the military.
  • The Russia-linked cyber gang known as Conti managed to cause major disruption to financial operations throughout Costa Rica in April.
  • cripple Costa Rica’s import/export business.
  • A group known as Lapsus$ began 2022 with a string of high profile targets including Nvidia, Ubisoft, Samsung and Microsoft. In each case, data was stolen and in many cases leaked online. Their operating model is extortion where access is most often gained through phishing and then they seek out the most sensitive data they can find and steal it. Often, they do not deploy encrypting software at all.
  • Hacking back is where offensive security experts will attempt to compromise attacker’s machines. This can be legally murky as often the attacking machines are compromised third parties.
  • June this year, a former Amazon employee, Paige Thompson, was convicted for her role in the 2019 Capital One breach. While working for Amazon Web Services (AWS), she exploited her knowledge of cloud server vulnerabilities and stole personal information of over 100 million people.
  • Ransomware, while not the overwhelming headline grabber it was a year ago, is still a major and terrifying threat to many companies
  • The main attack vectors continue to be credential theft and phishing emails so it is vital to continue to raise awareness through corporate training and public ad campaigns. Finally, the conflict in Ukraine is showing how effective cyber weapons can be in disrupting command and control in a war.
  •  
    To summarize, this article states that, it should not come as a surprise that the cost of a data breach has also increased to an all-time high in a year marked by significant increases in energy prices and worldwide inflation. According to IBM's Cost of Data Breaches Report 2022, the average overall cost is $4.5 million. Additionally, even if ransomware isn't garnering as much attention as it did a year ago, it still poses a serious danger to many businesses. Credential theft and phishing emails are still the major threat vectors, therefore it's critical to keep spreading awareness through public awareness campaigns and business training. Finally, the situation in Ukraine is demonstrating the potency of cyber weapons in sabotaging command and control in a fight.
1 - 20 of 20
Showing 20 items per page