Skip to main content

Home/ Hospitality Technology/ Group items tagged chip

Rss Feed Group items tagged

ypere044

Apple Point-of-Sale Upgrade Signals Better Security, NFC Access - 0 views

  • EasyPay mobile point-of-sale (POS) system
  • the company has taken a pre-emptive strike to ensure the security of customer credit card transactions and prepare for the future possibility of contact-less credit card purchases
  • the device accepts chip-and-pin (EMV) cards, which offer the current maximum level of account security.
  • ...1 more annotation...
  • NFC-equipped smartphone might be tapped to exchange information with the EasyPay device.
  •  
    This article introduces the upgrade to the EasyPay mobile POS system used in the US by Apple. The company has improved it's POS system by choosing to use new hardware (the iPhone 5s) and enhancing the hardware with a hard shell, accepting chip-and-pin (EMV) cards as well as a pin pad, and a Near Field Communications (NFC) feature in which smart phones may exchange information with the EasyPay. The article also talks about the future of chip-and-pin cards, Visa and MasterCard may be forced to begin using chip-and-pin cards by October of 2015. There is also talks of Apple including NFC features in their phones making it easier for guests to pay, share pictures and documents. 
earagon22

What is RFID Technology? (+Use Cases in the Hotel Industry) - 2 views

  • It’s no surprise that hospitality businesses want to take advantage of RFID technology too, especially when it offers speed, security, and a high-tech touch.
  • Seeing an opportunity to meet all of these objectives, Coachella Valley Music & Arts Festival rolled out an RFID wristband solution that allows faster entry into the festival and eliminates the risk of counterfeiting.
    • jblan183
       
      Coachella took the RFID wristband one step further than smart cards by placing the chips on wristbands, issuing RFID chips with unique identifiers to festival-goers. Instead of security scrutinizing every paper ticket upon entry, attendees simply scan their wristbands at RFID readers at the festival entrances to gain access, allowing them to get to their favorite stages faster.
  • One of the most popular use cases for RFID technology is guestroom entry. Compared to a traditional keycard, RFID-equipped cards offer hoteliers more control over security. Front desk staff can activate and deactivate cards remotely and review logs to see where and when a card was used.
    • jblan183
       
      Con: Keeping them near phones, wallets, or purses will demagnetize the cards, especially inconvenient should a hotel not have a complimentary card holder.
  • ...23 more annotations...
  • If guests have RFID-enabled keycard that contain payment information or room-charge information, guests can simply pay with their keycard
  • Besides granting entry to guestrooms, hoteliers can also use RFID technology to control access to amenities, parking, event spaces, and more
  • RFID tags on minibar items can alert hotel staff to low stock rather than tasking housekeeping staff with monitoring stock levels.
  • Most hoteliers have a line item in their budget to account for replacement of stolen items like pillows, hair dryers, and dishes. RFID chips on these frequent “souvenirs” can tell hotel staff when an item has left the building and give them the opportunity to recover the stolen item.
  • An RFID system is simply a cost- effective technology that uses radio waves to send a signal from a chip to a receiver.  RFID stands for radio-frequency identification, and this type of wireless technology involves two parts: a tag and a receiver.
  • Tags can be either passive (no battery, activated by the receiver) or active RFID tags (battery-power source, emits a signal that the receiver picks up).
  • RFID is a key component for IOT (internet of things) connectivity.
  • The tag contains a microchip with a unique code, and the receiver contains components to process the signal transmitted by the tag.
  • There are different types of RFID tags writes the RFID journal, "In general, low-frequency and high-frequency range tags are read from within three feet (1 meter) and UHF RFID tags (ultra-high frequency) are read from 10 to 20 feet. Readers with phased array antennas can increase the read range of semi-passive RFID tags to 60 feet or more."  Read range can also vary depending on environmental factors that effect the strength of radio signals.
  • its popularity has skyrocketed in recent years as the technology became cheaper and more applications were developed.
  • RFID wristbands at Coachella
  • Paper tickets for Disneyland are a thing of the past thanks to the RFID-powered “MagicBand” system that Disney rolled out in 2013.
  • Besides pure functionality, Disney also turned the MagicBand into a marketing vehicle; Disney fans can purchase MagicBands in their favorite color or emblazoned with their favorite animated character.
  •  Hotel and travel businesses usually begin by leveraging technologies like RFID for access control systems and asset tracking.  Due to the pandemic, contactless guest journeys have increased uptake of RFID, Bluetooth and NFC (nearfield communication) technology.
  • Festival-goers are issued wristbands embedded with RFID chips that each have a unique identifier, meaning that it’s essentially impossible to copy them. Instead of security staff scrutinizing every paper ticket upon entry, attendees simply scan their wristbands at RFID readers at the festival entrances to gain nearly instantaneous access.
  • Due to its relatively low cost, ease of use, and potential for operational efficiency, RFID technology can be an attractive solution for hoteliers looking to elevate their guest experience.
  • Door locks
  • RFID cards can also be more cost-effective in the long term as they don't get demagnetized.
    • earagon22
       
      My property uses RFID tech for room keys and it is so convenient as the wristbands don't get demagnetized when placed by phones or credit cards.
  • Controlled amenity access:
  • On-site payments
  • Outlets like restaurants, bars, and spas can use RFID technology to streamline the payment process.
  • Inventory management
  • Theft prevention
  •  
    Radio Frequency Identification or RFID continues to appeal to leaders in the hospitality industry as it allows for so many opportunities. RFID is a cost-effective technology. It utilizes radio waves to send signals from a chip to a receiver somewhere. Due to the COVID-19 pandemic, RFID technology usage has increased because of the consumers' desire to have contactless options. This article provides quite a few great examples of RFID technology in the industry. It mentions Disney and Coachella as they have switched to using RFID wristbands. Hotels, as mentioned in this article, can use RFID technology for a multitude of things. Some examples include: for door locks, on-site payments, controlled amenity access, inventory management, and theft prevention.
  •  
    The RFID is a very interesting and powerful system. Many industries have been using such system for a long period of time. In the aviation industry, the RFID helps to track and sort checked baggage at the airport by reading several inlays at one. Airlines that use such system has a higher customer satisfaction rate.
marvahb

Technology and Electronics Reviews - USATODAY.com - 0 views

  • Unfortunately, only 44% of retail storefronts have chip card readers enabled on their POS systems,
  • While no system is 100% secure, most can be made much safer than they are. But not all retailers take the necessary steps
  • Consumers can try to protect themselves by looking for retailers that have enabled chip-based credit and debit card use on their POS terminals
  • ...1 more annotation...
  • Even so, there are still lots of these thefts, in which criminals insert malicious software into a company's point-of-sale (POS) system. The malware surreptitiously records credit and debit card information when customers swipe them through payment terminals. It later sends the card information to the thieves, who sell it on the Internet underground, known as the dark web
  •  
    This article is well worth the read. It informs us as to why our credit cards keep getting hacked although our favorite retail stores seems to have secure POS systems. There is actually lots of time and money that needs to be invested in order to have a secure POS. Many of these hacks keep happening because companies wait until it's too late to upgrade to chip reader POS or a higher performance security
Allen Lok

New Retail Credit Card Standards Affect Quick Service Restaurants | QSR magazine - 0 views

  • By October 2015, all restaurants and other merchants will be subjected to new Europay, Mastercard, and Visa (EMV) standards, which reflect a shift from magnetic-stripe credit cards to chip-and-pin cards.
  • , the chip-based cards require insertion of the card into a terminal throughout the entire transaction.
  • chip-based cards are less susceptible to fraud.
  • ...1 more annotation...
  • It’s a rather slow conversion over to EMV. But it’s definitely coming.” View the discussion thread. Subscribe Subscribe to QSR Renew Update Address eLetters Advertising Contact &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Articles Food &amp; BeverageMenu Innovations Marc Halperin: Resident F&amp;B Expert Food Safety Health Ingredients &amp; Dayparts ExpansionQSR 50 Franchising Growth Fast Casual George Green: Fast-Casual Expert Emerging Concepts TechnologyOrdering Social Media Promotions Sustainability Denise Lee Yohn: QSR’s Marketing Guru OperationsExecutive Insights Competition In the Store Consumer Trends Charitable Giving Outside Insights Women in Foodservice Human Resources Alan Philips: Trends to Watch Research QSR 50 OneSource Drive-Thru Study Growth 40 Smart Chain Franchise Opportunities Find a Supplier Find a Job Restaurant Management Events NRA Show <a h
  •  
    A new set of standards is coming up for credit card transactions. EMV or Europay, Mastercard, Visa, standards include a chip-and-pin device on the card that requires the card to be inserted into the card processing terminal. While this does not prevent all fraud, it's important that this standard is mandatory by 2015 and business operators should be preparing for changes.
yuzhu li

New Point of Sales Technology for Your Business | Family Money Values - 0 views

  • Chip based credit cards.
  • is closely intertwined with NFC and smartphones.
  • New payment services players.
  • ...4 more annotations...
  • field offering lower entry costs to small merchants
  • With the ability to pair small mobile card readers with smartphones, businesses can ensure that their employees can take payment anywhere, anytime, which has tremendous potential for never missing a sale.
  • Enhanced security.
  • the natural evolution of a technology key to day-to-day business transactions, they are also a response to fraud and identity theft
  •  
    For family run business, according to Ms. Bekiroglu, to know its business' better way is to keep up all like payment kiosks, self-check out stations, touchscreen interfaces, etc. and the most important 3 parts are the "chip based credit cards", "new payment services players" and the "enhanced security". Chip based cards is more secure and the data is single used in the transaction, and it can crack down on fraud and identity theft. New payment services players mostly means the apps. From my opinion, the important thing for the whole business world is the security part. One of my friend used the credit card for gas, however, in days, the card had been used over 4 thousands. Finding out the reason is because the leaking information at the gas station. Only the security part has been enhanced, POS systems would be more effective.
lalle044

The smart card: Apple Pay competitor or simple stopgap? - CNET - 0 views

  • Paying with a Stratos may not be as seamless as holding your iPhone near the register and using Apple Pay. Apple's mobile payments service lets iPhone 6 and iPhone 6 Plus owners use their smartphones and their fingerprints to charge purchases to their credit cards just by holding their iPhone near a terminal. And while technologists rejoice at Apple Pay's security, only 6 percent of iPhone 6 and iPhone 6 Plus owners used Apple Pay as of March, according to market researcher InfoScout.
  • ow so-called smart cards like Stratos, Coin, Plastc and Swyp have come on the scene. When coupled with a smartphone app, these devices -- which cost around $100 -- let users store and toggle among different payment cards on the fly. Cards are scanned in using a small card reader and managed with a smartphone app.
  • It would be awesome if every single merchant took Apple Pay," he said. But that's not the reality. "It's kind of crazy that we're in 2015 and we're still paying with cash and plastic, and we have a computer in our pocket." Until the computers in our pocket become the main way to pay, he has a Coin card.
  • ...3 more annotations...
  • If you have a chip in your card, the POS system is going to prompt you to put your card in the [chip] slot," Mulpuru said. That becomes a problem with products like Stratos, which do not contain chips. That means you'll still need to carry around a backup card.
  • By October 2015, merchants that haven't upgraded their terminals to accept the new cards will be the ones liable for fraud, not the credit card companies. The result: we'll start to see many more EMV-ready point-of-sale (POS) systems.
  • What's more, Stratos, Coin and their rivals don't directly store credit or debit card information unencrypted -- and only transmit sensitive data from your smartphone. That makes devices inherently more secure than the standard magnetic stripe credit card. There are also options to deactivate the card if it loses communication with your phone
  •  
    I was listening to the news over the week end and was intrigued about a story on a new smart card that would one day take the place of all of our credit cards. My mind started reeling and could not grasp the concept especially with technology and hackers in the forefront of any credit card online usage. I read this article several times and it helped me understand the simplicity of this card and also the fact that your credit/debit account numbers are not stored on the card just a chip then the consumer either uses a PIN number or signature as authorization for payment. Fingerprint technology will be added in the future, which will bring about an evolution into the use of the Smart Card.
Dian Peng

Intel, HP Using Xeon Phi Chips for Energy-Efficient Supercomputer - 0 views

  •  
    The article mainly talked about that the Intel, HP created a energy-efficient supercomputer by using Xeon phi chip. This supercomputer would be announced in September and used by the department of energy's national renewable energy laboratory. They would do research on it for solving energy-related issues. The installation would start in November. According to researcher, the heart of NREL is based on a powerful combination of the Intel Xeon processor E5 product family, which leads the data center industry in performance per watt, and Intel Xeon Phi coprocessors which are setting new records for energy efficiency. Then, the article pointed that the key part of Intel's high performance computing effects are Xeon Phi chips. Xeon Phi is the brand that Intel has wrapped around its Many Integrated Core (MIC) technology, which has been in development for more than two years. Now, they are very popular in such areas as in HPC. This new system will allow NREL to increase our computational capabilities while being mindful of energy and water used. At last, the article also showed another new technology-cooling. System vendors have been using water and other coolants for several years to help remove heat from data center facilities. Water cooling tends to be more efficient than air.
sosor012

Ransomware attack on chip supplier causes delays for semiconductor groups | Financial T... - 0 views

  • Disruption from a ransomware attack on a little-known supplier to the world’s largest semiconductor equipment manufacturers will continue into March, in a new setback to chip production after years of coronavirus-related delays.
  • first identified on February 3,
  • MKS’s customers include many of the largest companies that produce semiconductors and the specialised equipment necessary to manufacture them, including TSMC, Intel, Samsung and ASML.
  • ...8 more annotations...
  • The company had revealed on Monday that it could still take “weeks” more to restore operations and would cost hundreds of millions of dollars in lost or delayed sales. Most ransomware victims are able to recover in about three weeks, according to industry estimates.
  • The attack affected “production-related systems
  • , the company has now told the US stock market regulator that it is unable to file its annual report on time
  • the final impact on quarterly sales could total as much as $500mn — more than half what Wall Street had previously predicted
  • The semiconductor supply chain, which in many places relies on components made by only one provider, has faced repeated shortages over the past two to three years due to production and logistics delays.
  • However, demand for smartphones and other consumer electronics has waned in recent months as coronavirus lockdowns eased and consumer spending has been squeezed by inflation.
  • , it is unclear if MKS will be encouraged by US law enforcement to resolve the issue by paying a ransom.
  • Shares in MKS fell by about 15 per cent between February 3,
  •  
    The article "Ransomware attack on chip supplier causes delays for semiconductor groups," discusses the affects on a company due to a cyberattack that occurred February 3rd. The company is believed to have setbacks into March and that it would cost hundreds of millions of dollars in lost or delayed sales. The company also believes they will be unable to file its annual report on time and possibly have to resolve the issue by paying a ransom. This also cost a 15% decrease of shares for the Company.
wenzheng guo

What Are the Different Types of Key Card Systems? - 2 views

  • Metal keys with a jagged row of teeth are becoming increasingly rare as technology improves.
  • In locations as diverse as hotels
    • wenzheng guo
       
      4 kinds of keys mention in the article.
  • using key cards instead of traditional keys.
  • ...17 more annotations...
  • four types of key card systems: holecards, bar code cards, magnetic strip key cards and radio frequency identification (RFID) cards
  • Holecards are the earliest type of key card systems
  • An individual key card is programmed by a computer with a unique electronic signature.
  • If stolen, magnetic strip cards and RFID cards can have the signatures changed, adding security protection from theft.
  • Key card systems operate on the relationship between a plastic card and electronic access control locks
  • Bar code cards were the next innovation in key card technology.
  • The technology used by this type of card includes microchips and radio technology, so it is considered the most difficult to forge and provides the highest level of security.
  • Sornes devised a system that would punch a series of 32 holes into a plastic card. The card would correspond to a lock and would open a door when it was inserted into a slot in the door.
  • his key card type lost popularity when magnetic strips became more readily available,
  • because bar codes could be forged and the electronic reader easily fooled.
  • Magnetic strip key card systems are widely used in the hotel industry and in workplace security. This card looks like a credit card with a thin metallic strip on the back.
  • This type of card is much more difficult to forge than holecards and bar codes, providing an added layer of security.
  • RFID key card systems are a more recent form of technology than holecards, bar code cards or magnetic strip cards. RFID cards have a radio sensor chip embedded inside the card.
  • When brought into close proximity of a correspondingly programmed reader, the door unlocks.
  • an individual bar code is created to correspond with a particular lock and is printed on a card.
  • The technology used by this type of card includes microchips and radio technology, so it is considered the most difficult to forge and provides the highest level of security.
    • wenzheng guo
       
      Later biological key like facial identification may be the next era of keys.
  • In 1975, inventor Tor Sornes devised a system that would punch a series of 32 holes into a plastic card. The card would correspond to a lock and would open a door when it was inserted into a slot in the door.
    • wenzheng guo
       
      first step of security keys.
  •  
    This article is about the different keys available for hotels to use for their rooms. Metal keys which are like what we use everyday for our homes is an outdated form of security key in the world of technology. The key card system is a plastic card with electronic access. Hole cards seen rarely today is a plastic card with a series of holes to correspond to a specific door in the hotel. Bar code cards is exactly that a card with a bar code, like you see at the supermarket, which is placed under an electronic reader. This type of key has been fazed out due to easily being fooled. The magnetic strip key card are widely used in the hotel industry. They look like a credit card with a metallic strip on the back. It has extra protection unlike other types of keys. The newest system is the RFID key card system, which has a radio sensor chip embedded inside. It works with a programmed reader and when the key is brought in close range the door unlocks and opens. This article was about the security keys being used in hotels.
  •  
    Marilyn, This is an interesting article because I never knew the progression of hotel key cards. I do not think anyone did and we just assume they started somewhere simple and got to where they are at now. Key Cards with RFID seem as though they are the best type of key but also very expensive for the hotels, especially if it is a large property. We only see the one kind of key card now in hotels and to me it seems secure but who knows what information is actually stored on that card. Great article !
  •  
    This article is about the different keys available for hotels to use for their rooms. Metal keys which are like what we use everyday for our homes is an outdated form of security key in the world of technology. The key card system is a plastic card with electronic access. Hole cards seen rarely today is a plastic card with a series of holes to correspond to a specific door in the hotel. Bar code cards is exactly that a card with a bar code, like you see at the supermarket, which is placed under an electronic reader. This type of key has been fazed out due to easily being fooled. The magnetic strip key card are widely used in the hotel industry. They look like a credit card with a metallic strip on the back. It has extra protection unlike other types of keys. The newest system is the RFID key card system, which has a radio sensor chip embedded inside. It works with a programmed reader and when the key is brought in close range the door unlocks and opens. This article was about the security keys being used in hotels.
Paulette Grant

Disney Taps Contactless and NFC Technology as it Seeks to Connect Customers to Its Fant... - 0 views

  • Perhaps most valuable for Disney is the personal information it hopes to collect from use of the wristbands and from the Web site and app, on an opt-in basis. Personal information could be encoded on the chip of the MagicBands, allowing, for example, Disney employees to greet young visitors by name, according to published reports. The costumed employees might have a hidden contactless reader, though the bands reportedly will store “no personal identifiable information,” Disney reportedly said.
  •  
    The article highlights the dramatic change that Disney will effect to increase customer service at the theme park using the Near- Field Communication technology (NFC). This technology which is presently been use by hospitality firms and other industries will allow Disney to eliminate the need for room keys, credit cards, and paper tickets. Customers will be given a wrist band which will be tied to the Disney websites and all accounts numbers and IDs created on the website will be embedded in a chip that is also embedded in that wrist band. All you will need to do is just give it a tap and boom! You are given access to rides, movies, restaurants, kiosks and other attractions within the park. According to the report this saves customers and Disney tremendous amount of time but the real deal behind this is to gather more personal data about customers, and track all the activities you engaged in plus the things you bought. Personal information could be encoded in the wrist band so that an employee or even mickey mouse could greet you by name. All this technology sounds very good but what if I lost my wrist band and it gets in the hands of someone else. The article states that the wrist band can be remotely deactivated if lost or stolen. You and I know that when you having fun at Disney no one will be looking at their wrist every five minutes to see if a wrist band is still in place. If someone found my lost wristband and I notice two or three hours later who will be responsible for all these charges racked up by someone else? I really like this technology because I hate having to wait in long lines; anything that would make my life easier I will pay for it. Having said that I do believe that there are facets of this amazing technology that still needs to be tweaked.
Ryan Jove

iPhone 5 Apple Announcement Roundup & Review | iOS Affairs - 1 views

  • iPhone 5 Apple Announcement Roundup &amp;&nbsp;Review
  • the iPhone 5 was announced. The
  • The screen will now be 4 inches
  • ...15 more annotations...
  • 18% thinner
  • 20% lighter.
  • That means that your eye
  • literally cannot distinguish one pixel from another.
  • there will be a 5th row of icons
  • 44% more color saturation
  • The A6 chip is 2 times faster than the A5 chip running the new iPad and the iPhone 4S.
  • 2 times faster graphics.
  • chip that is 22% smaller than the A5,
  • Apple has added LTE
  • It is an 8mp camera
  • the hybrid IR filter, 5-element lens, and f/24 aperature.
  • will snap photos 40% quicker than the iPhone 4S does
  • Video shot with iSight is 1080p with improved stability and face detection.
  • use FaceTime over cellular networks, 3 integrated microphones for better audio, and wideband audio.
  •  
    Apple has made an announcement regarding the release of the iPhone 5 this Friday September 15.  How does this affect hospitality?  With all of the enhancements that apple has pressed forward with this new iPhone, hospitality will feel pressure to adapt and change with the times and you nailed it, they will have to continue to buy new tech.  If apple is able to make their iPhone 18% thinner and 20% lighter while making it larger and more durable, the hospitality industry will have to respond in their own tech.  Also, this new technology enables hospitality firms to direct their efforts more effectively with better tech.
yiran DING

Luxury Hotel Leads Way in Green Energy Savings | The Green Travel Blog - 0 views

  • Green Energy Savings
  •  
    Luxury hotel is a hotel group in British. It use a more environmentally friendly way to reduce their costs instead of raising bills. Several eco-attempts have been made.  Five years ago, Swinto Park installed a wood chip boiler and made the hotel carbon neutral from a heating perspective. It also use a highly efficient laundry system, which reduces the energy and water use by 30 percent.  The article also mentioned the US group of hotels called Green Hotels Association(GHA), an organization of hotel managers who dedicate in energy saving in hotels. 
aali057

The Savoy Hotel Goes Green - 1 views

  •  
    The Savoy Hotel Goes Green! Patterson is the Sustainability Manager at the Savoy and she states "environmental responsibility is a core value of the Savoy and it factors into all of our business decision making." Their goals are toe become socially, economically, and environmentally responsible. Some of the initiatives that they have started on the property include reclaiming heat from the kitchen refrigerator to preheat water, as well as combined heat and power plant (CHP). The CHP chip uses heat generated from a gas engine which is used to heat the building and promote hot water. This CHP chip produces 90% of our summer cooling and 50% of winter heating. Guest rooms on property have Inncom AC and heat systems which help control the temperatures in the room. The property has LED lighting and they use metering and water bottling plant systems, food waste recycling.
aali057

http://www.forbes.com/sites/rahimkanani/2014/06/21/the-savoy-hotel-goes-green/#2fce7c09... - 0 views

The Savoy Hotel Goes Green! Patterson is the Sustainability Manager at the Savoy and she states "environmental responsibility is a core value of the Savoy and it factors into all of our business de...

started by aali057 on 17 Nov 16 no follow-up yet
mtorres619

Bluetooth Proximity Marketing - How can retailers benefit? | LinkedIn - 0 views

  • Bluetooth Proximity Marketing is the latest marketing technique, but how can retailers apply and benefit from it?
  • Bluetooth is a short-range wireless system found on most smartphones and tablets nowadays that transmits information and can receive information without wires. We use Bluetooth in our cars to call people without a headset or to send files to another device without a USB cable.
  • Bluetooth Proximity marketing can have many applications, but can it be applied to the shopper experience and if so how can the retailer and consumer benefit? Within Bluetooth Proximity Marketing there are several types of applications.
  •  
    Bluetooth proximity marketing was the new and upcoming marketing technique back in 2014. As learned this week in class this kind of marketing is used to connect with potential and existing consumers. There are four different types of proximity marketing that should be considered:  Internet enabled device (cell phone, tablet, etc) with GPS.  WiFi device (cell phone, tablet, etc) within range of a transmitter  Bluetooth device (cell phone, tablet, etc) being within range of a transmitter  NFC enabled phone that can read a RFID chip on a product or media. The main one described in this article is Bluetooth. An example of Bluetooth proximity marketing would be a retailer adds a transmitter to a specific promotional spot, and the person with a Bluetooth enabled phone may receive a coupon for the products found at that promotional spot or a complimentary product. The target is to directly market the consumer, you can send coupons, engage the costumer, send relevant information, etc.
Xinyu Tian

- USATODAY.com - 1 views

  • To keep robes and towels from checking out, a small but growing number of hotels are starting to use new radio frequency chips to keep track of their inventory.
  • Bendable and washable, the tags can be read by sensors up to 6 feet away. When towels are removed from a closet, for example, a reader station can register how many, so that the closet can be restocked.
  •  
    This article in USATODAY published in 2011 talks about the cost benefit analysis of RFID tags and hotel linens. Hotels are using this technology to keep an accurate count of all their linens: bathrobes, bed sheets, towels, bathmats, pool towels, etc. The benefit of having an accurate count is especially significant today with the rising price of oil which in turn raises everything including cotton. By investing an additional dollar per towel the Hotel can cut down on labor costs and improve housekeeping productivity. The initial investment is high which is why many hotels cannot afford the technology. I would recommend that high-end luxury hotels invest in the RFID tags however because of the higher prices of luxury linens. By preventing asset pilfering the Hotel will retain their initial investment in linens.
  • ...5 more comments...
  •  
    Data field encryption can be the solution to protect the credit card information of the guests. Nowadays there are still problems with cardholder data in many establishments such as bars, restaurants, shopping stores, and hotels.
  •  
    RFID technology can be applied to various aspects of operations at a hotel. For example, RFID tags can be used to keep track of linens and laundry items to save costs and improve guest satisfaction. About 5% to 20% of linens at hotels typically go missing.
  •  
    Based on other related articles I read, it seems like the utilization of RFID technology will start increasing its use in hospitality industry in 2-3 years and become the mainstream of tracking system in the next 4 years.
  •  
    Since the RFID tags are being added to hotel property there are no privacy concerns as well making this technology more user acceptable.
  •  
    In my cruise ship post, I mention that wrist bands are now RFID enabled to keep tabs on the wherebouts of guests on the ships and on large resort complexes as well. They actually make a great secure way of payments while on vacation. You just tap/scan the wristband and can charge items to your room.
  •  
    I saw that and I enjoyed your cruise ship article very much. However I am glad that cruise ships are still making RFID wrist bands optional because of privacy concerns, the last thing you want to worry about while on vacation.
  •  
    In my opinion it's an ideal solution but a bit impratical. Is it worth spending that one extra dollar on all the linens in a hotel just to prevent 5% to 20% known loss? Intention of cutting losses might end with increasing cost. Don't forget the tracking RFID also requires maintenance, which also costs extra.
Adilen Alfonso

Hotels Tap Tech for Loss Prevention | Top Stories | | Hospitality Magazine (HT) - 0 views

  • But new technologies are becoming available
  • From RFID linen/supplies tagging to inventory management; from automated minibar technology to video surveillance and door locking technology, hotels are finding new and innovative ways to protect their assets, and their guests.
  • a radio frequency identification system (RFID) that allows MGM Resorts to track and understand inventory quickly and effectively.
  • ...7 more annotations...
  • RFID-enabled locking technology
  • The system was implemented in December 2009, and has resulted in balanced inventory
  • When inventory is received, chips are either pre-installed or sewn into them and inventory is entered into InvoTech’s GIMS system
  • The new system allows the facility to monitor and audit a lock to determine when the room was entered and by whom.
  • security cameras provide “eyes in many places
  • merging technology takes these measures to a higher level, using intelligent software for example in security cameras, to provide detailed surveillance information.
  • Good technology in the hands of skilled administrators and managers who have put well-developed and well-communicated processes in place is what really makes the difference in terms of loss prevention for hotels.&nbsp;
  •  
    This article shows how hotels are using technology to improve their loss prevention and security systems. Hotels, like the ARIA in Las Vegas, are implementing radio frequency identification systems (RFID) to efficiently track their employees' uniforms. This specific hotel has the advantage that it is a new hotel and therefore can start with a blank slate, versus other hotels that will implement it as their budget allows. The RFID chips are sewn into the uniforms and then entered into the inventory system. This allows the hotel to monitor where and in whose hands the uniforms are. Other hotels, like the Arnold Palmer in Orlando, are using RFID for security. The RFID locking technology audits locks and tell the hotel when and who entered a room. In addition, sophisticated cameras with intelligent software are being used throughout different points of hotels' perimeters to safeguard guests. These sophisticated technological breakthroughs are only efficient if organized data management and communication processes are put in place. I think that the use of technology to better monitor theft and security is a great area for hotels to invest their money on. The use of cameras to detect alarming fast speeds of boats near hotels with ocean perimeters is not something that guests look for when deciding on hotels, but it is an added feature that adds value to the hotel in the long-run and one that can save lives.
noreen1

Security and technology coming together for locks in 2015 | Hotel Management - 0 views

  • Many electronic lock manufacturers strongly recommend evaluating and focusing more on security if a hotel is making the move to mobile access locks.
  • “Poor implementation can be a risk,”
  • “Whenever a new layer of technology is added, security needs to be increased as well.”
  • ...2 more annotations...
  • The security of a mobile door lock is part of a larger challenge of guest security as hoteliers have access to more guest data.
  • Mrowczynski cautions hoteliers to increase security at the back-end of the hotel—employees can be a threat to security with mobile technology as well. He also said every room lock should be bench-tested. “As long as everything is researched, tested and retested, everyone will be fine,” he said.
  •  
    This article serves as a good reminder that as hotels adopt certain technologies to enhance the guest experience, it is also important to remember to test and retest these new technologies for possible security concerns. The thought of being able to open your hotel room door with your cell phone is appealing and convenient, but also comes with some security concerns that traditional key cards do not. On the other hand, some argue that RFID chips would actually make door locks more secure, and make it easier to track who enters the hotel room and when. Either way, security concerns always have to be considered when adopting new technologies.
miamigol

Hotels Tap Tech for Loss Prevention / Hospitality Magazine (HT) - 0 views

  •  
    Hotels have always considered theft a cost of doing business. From linens to furniture, for some guests everything is up for grabs. However, guests are not the only ones responsible for missing assets in a hotel. Staff is also responsible for miscounting, misplacing, and missing items, uniforms and supplies as well. As a result, hotels are now turning to tracking technology to account for their assets. Since asset tracking can mitigate loss and increase revenue in the long run, modern asset management will necessarily have to rely on tracking devices. According to the article, radio frequency identification system (RFID) is now the latest and most efficient uniform inventory technology available. It allows MGM, for instance, to track 125,000 uniforms of its ARIA Resort inventory in Las Vegas. Chips are either pre-installed or sewn into the uniforms. This technology was first implemented in 2009 and has resulted in balanced inventory ever since. Moreover, these chips can also be installed in expensive bed comforters, paintings, lamps and even TV sets. Asset tracking enables not only accurate audits of items like towels and bathrobes but also deters guests and staff from theft or misplacement.
msbode

Ensuring Software Integrity in IoT Devices - 3 views

  • oT is defined as the Internet of Things. The Internet of Things refers to the ever-growing network of physical objects that feature an IP address for internet connectivity, and the communication that occurs between these objects and other Internet-enabled devices and systems
  • Gartner predicts that there will be 20.4 billion connected Internet of Things (IoT) devices by 2020, with 5.5 million new things getting connected every day
  • more than half of major new business processes and systems will include an IoT component by 2020
  • ...9 more annotations...
  • Manufacturers are rushing products to market with little or no thought to security, often including hardcoded passwords or known vulnerable software libraries. While this problem is most obvious in the consumer space (which gets the most news coverage), vulnerable IoT devices are present in every business sector as well
  • The TPM stores secret keys, passwords, and digital certificates in its secure internal storage protecting them from software and physical attacks. The TPM acts as a root of trust for checking platform integrity at boot time (i.e., check against any malicious change). A cryptographic hash value of the platform configuration is calculated and compared against the precomputed hash value of the platform. Access to the platform is denied if the integrity check fails [4]. This is the beginning of the “chain-of-trust” for software modules that are subsequently initiated. This transitive trust mechanism is one of the important security features in trust computing. It uses the trust root as a starting point to establish a chain of trust model, in the order of trust root, boot loader, OS, and Application.
  • Secure boot provides the foundation for Trusted Boot, which extends the trust boundary to the boot process and eventually the operating system.
  • software attestation attempts to achieve a dynamic root of trust without specific hardware support. This method has the advantage of not requiring any stored secrets (cryptographic keys or passwords) and allows applications or modules to be updated, which may not be possible if hash values are stored in immutable formats, such as a TPM chip
  • While Secure Boot validates the platform and firmware, Trusted Boot is generally defined as verifying each software module before execution and extending the chain-of-trust to the entire operating system. During the boot sequence, the digest of each executing program is recorded before it executes. A TPM (Trusted Platform Module) is used to store all these records and then report on them securely.
  • It is important to note that Trusted Boot requires a TPM chip so the operating system can see the chain of execution, thus it may not be an option for some IoT devices. Lack of trusted boot support would allow an attacker with physical access, or using a software vulnerability during run time, to potentially modify the stored code and compromise the device.
  • There are many other attack possibilities to consider with IoT devices. For example, existing TPM architectures do not support runtime integrity checking and this allows attackers to exploit vulnerabilities to modify the program after it has been verified (at time of check or TOC) but before the time of its use (at time of use or TOU) to trigger unintended program behavior, such as the execution of malicious code or the leaking of sensitive data
  • Physical attack is a viable method of compromising the integrity of a device. Modifying and replacing firmware by an attacker may be worth the effort, depending on the perceived value of the device or the data it may access (such as a video camera or ATM). Attackers can go as far as removing memory and reading its contents.
  • a device built today can become a major problem tomorrow
  •  
    The purpose of this article was to review the available literature on the subject of ensuring software integrity for IoT (Internet of Things) devices, focusing on detecting and preventing modification of the original software, so that the device cannot be used for unintended purposes. The literature reviewed; secure boot, trusted boot and runtime security. Concluding that no one single control is going to adequately protect a device the solution based upon 25 years of experience is to create a multi-layered approach to security that starts at the beginning when power is applied, establishes a trusted computing baseline, and anchors that trust in something immutable that cannot be tampered with. Additionally, because a device built today can become a major problem tomorrow, due to them having hardcore keys "set and forget", the internet will then have literally billions of obsolete hosts in the coming years. Therefore it is important for MIS Managers/ Consultants investigate how to change the game in order to mitigate the damage or economic value of new systems being breached and by asking questions such as 'Can we even in the presence of a malicious attacker offer some limited form of security for the most valuable transactions (such as e-banking) or assets?' and 'Can we make the 'business' of the attackers less attractive by applying security technologies that are particularly tailored towards destroying the business model of the attackers?'
1 - 20 of 58 Next › Last »
Showing 20 items per page