Skip to main content

Home/ Hospitality Technology/ Group items tagged disabilities

Rss Feed Group items tagged

delaneyverger

New Point-Of-Sale ADA Lawsuits - Hospitality Business News - 2 views

  • For example, McDonalds was recently hit with a nationwide class action alleging that its new Coca-Cola Freestyle beverage dispensers violate the ADA because their touch-screen interfaces are inaccessible to the visually impaired.
  • The availability of hefty damages in many states increases the potential exposure businesses face. For example, in California, a single violation with respect to a POS device, entitles the plaintiff to a minimum of $4,000 in statutory damages, plus his attorney’s fees and litigation expenses. Potential liability can be overwhelming when these type of lawsuits are brought as class actions.
  •  
    This article discusses how self-service POS systems are now under fire from the ADA for not being accessible to people with disabilities. Most of the lawsuits have claimed that the problems with these systems are 1) they are mounted too high or at angles that are inaccessible for people in wheelchairs, 2) they do provide captions for those with hearing disabilities, and 3) they do not provide tactile feedback for those with visual disabilities. The ADA provides guidance for different types of technology, such as ATMs and vending machines, but has not provided such guidelines for these new POS systems. Because of this, the courts are having difficulty determining how to better enable these POS devices to work for those with disabilities, having to determine what to do for each individual device. Furthermore, these lawsuits pose a big risk to these companies. Businesses need to better evaluate their POS devices in order to make them more user-friendly for all individuals.
Chang Ren

Conference News - Presentation Solutions - Virtual Meeting Technology Helps Disabled Ve... - 0 views

  •  
    virtual events provider ON24, which announced today that it has teamed up with Veteran Recruiting Services - the market leader in virtual career fairs for the military community - to host the first-ever virtual career fair for veterans with service-related disabilities. The career fair gives disabled veterans the opportunity to benefit from the advantages that virtual meetings offer, not the least of which is having equal access to the event, with no physical travel required.
nashalsiddiqi

What are the three big technology issues for the hotel industry? | PhocusWire - 0 views

  • The fragmented nature and location of hotel systems means a guest’s credit card number could exist in multiple systems in formats of varying security in locations of varying security.
    • kmira026
       
      1st technology issue for hotel industry
  • HTNG has set up a workgroup that will a framework that will enable hotels to concentrate the storage of sensitive card data in a single system, managed securely by a vendor or the hotel company.
    • kmira026
       
      Solution for 1st technology issue
    • nashalsiddiqi
       
      is this enough?
  • it has become critical for hotels to appear correctly and accurately in search results, as search engine sites have essentially become the gateway to travel research and inspiration.
    • kmira026
       
      2nd technology issue is Unique Global Identification Numbers. Something as small as a incorrect address can cause a problem
  • ...18 more annotations...
  • In both Europe and the US, regulations are being released and revised to provide support to guests with disabilities.
  • With the increase in electronic distribution of hotel information and transactions, hotels are working to provide better information and service to guests with disabilities.
    • torte003
       
      The three main technology issues hotels are facing are PCI, ID numbers , and support for best with disabilities.
    • torte003
       
      PCI is a main security threat that they face. Having a hotels cc system hacked and all their guest information stolen is an extreme nightmare. They have tasks forces that help educate hotels on how to protect and learn more about the procedures to keep that secure.
  • I can hear some of you now – what good can possibly come from creating an ‘association of associations’? Aren’t we just creating more overhead, more cost and more bureaucracy? In a word, no.
  • From my own perspective
  • I hate wasting our scarce
  • resources, and worse, wasting the resources of our members who volunteer their time to work for us
  • Other council member organization initiatives include a white paper authored by AH&LA, a payment technologies committee established by HEDNA, and the support by OpenTravel of needed XML specification changes as required by the industry.
  • thousands of companies worldwide provide hundreds of software applications to help hotels and hotel companies manage operations to provide better guest service.
  • three key technology issues that are having, and will continue to have, a direct strategic impact on the hospitality industry:
  • Search engine optimization is a great thin
  • PCI (payment card industry) complianceUnique identification numbers for hotelsSupport for guests with disabilities
  • ‘holy grail’
    • torte003
       
      Having wrong information about your hotel or business can be such a negative impact on business. With everyone now on google or yelp having the right information is crucial.
  • y company has become critically important for the financial stability and market credibility of the hospitality industry.Members of the HTSIC have addressed this issue in a coordinated
    • vanessavioli
       
      Cyber security is almost equal to climate change in the impact on the industry. As we move into being a cashless society, keeping guests information private is integral to the continued growth of the industry.
  • Initiatives specific to distribution include the creation of standard room definitions and descriptions, guaranteeing accessible guest rooms and removing the accessible guest room from inventory when booked. HEDNA has worked on creating this vocabulary, and OpenTravel has revised its hotel schema, annotations and code list to reflect these changes.
    • vanessavioli
       
      This is an extremely important issue for the industry. Creating an industry standard vocabulary to ensure that guests with disabilities receive the specific room and accommodations they need is a game-changer. The ease of mind that it would create for those customers is priceless.
  • And our biggest strength is our commitment to work together, to eliminate redundant work or conflicting positions, to be transparent and open in our dealings with each other, and to address the most important technological needs of the hospitality industry.
    • vanessavioli
       
      With the ease of current technology, concerns about many of the bureaucratic aspects of something like this can be quickly done or even potentially eliminated.
priscillamuniz

Location-Based Ads: Convenience Versus Privacy - 0 views

  • Privacy concerns may leave consumers feeling inclined to disable location tracking on their smartphones. However, the number of users who actually enable or disable their location tracking varies based on what source you consult – and perhaps the type of device.In 2022, Android Authority found that most people still leave their location tracking enabled. In its poll of more than 1,400 people, 66.8 percent of Android users said they keep their location-tracking enabled. In contrast, in 2021, Flurry Analytics found that only 4 percent of iOS users in the U.S. opted in to app tracking. There’s an important distinction here: iOS 14.5 and later versions give users the choice to opt in to location-tracking rather than opting users in by default. Users can manage their Android device’s location settings and grant or deny location-tracking permissions. 
  •  
    What I found interesting was the type of device and number of users that actually enable or disable their devices. Android users tend to leave their location-tracking enabled. 4 percent of iOs users in the U.S. opted in to app tracking. In addition privacy still is a concern when it comes location-based marketing.
Qianlin Wang

Data Security Basics: Five Security Issues All Hotel Operators Need to Know | hospitali... - 0 views

  • This article looks at the top five issues facing hotel operators and what actionable steps can be taken to decrease the likelihood that your business will be stung by data thieves.
  • Franchise operators need to be aware, however, that an improperly configured RMA is vulnerable to data compromise attack by hackers. 
  • Transaction volume, brand recognition and the potential for sensitive data retention are all factors that make hotels (particularly franchise networks) juicy targets for hackers seeking to exploit insecure networks via the Internet. 
  • ...3 more annotations...
  • Hotel operators need to know that passwords, designed to keep criminals out, can also be a vulnerability in the absence of proper controls
  • Thanks to wireless networks, guests can speed though the check-in process, expedite valet parking and send room service orders directly to the kitchen.  At the same time, hotel operators should recognize that criminals can leverage improperly secured wireless networks to steal cardholder data and should implement strategies to thwart these efforts. 
  • Despite all best efforts, data compromise events can occur and every hotel operator should have a plan in place. Prompt action must be taken by hotels or restaurants that have experienced a suspected or confirmed security breach to help prevent additional exposure of cardholder data and ensure compliance with the data security requirements. 
  •  
    The article discusses five issues that hotel operations are facing, and how to decrease these issues in regards to data thieves. The first security issue discussed is "Remote Access", the article states "Many hotel operators and franchisors use remote management applications (RMAs)". This enable easy access to manage multiple locations downloads; conduct sales polls, and other systems within multiple companies. A advices to remote control issues are to change vendor default settings, in which you can create unique user IDs and complex passwords. Another advice is to "Configure the RMA", in which users are only allowed to connect to known MAC/IP. I personally don't think that creating a unique ID or account password may solve this issue, but allowing connection capability to a set IP/MAC is a wise intake. Although being able to just connect to a set MAC, will cause a limit on where and when you connect. The second security issue is "Network Security", many transaction volumes are being exposed, brand recognition as well; and that attract hackers. In order to reduce this problem, it is suggested that companies need to install and maintain a fire wall at all time. I agree with this other suggestion which is to Use outside resources to help identify new security vulnerabilities. This is great, because a company will be able to receive an outside outlook in regards to security. The last three issues that are on this list are: Password Management, Wireless Security, and Incident Response Plan. Overall it's evident that any system that has a password requirement is causing a major attraction towards security thieves. The suggestions within this article are great, but from my observation; many companies will have to put in time to track and monitor their systems. Systems can't allow to be left open without monitoring, and the internet is a lead way to all this, so any system that requires the internet must be monitored, and protected.
  •  
    Technology enables service. That's the idea, anyway. In the hotel industry, thousands of companies worldwide provide hundreds of software applications to help hotels and hotel companies manage operations to provide better guest service. However, the hospitality industry continues to find itself targeted for damaging data compromise events by hackers. There are some good ways to decrease the attack of hackers. For example, Remote Access, many hotel operators and franchisors use remote management applications (RMAs).  Their ease of use in managing multiple locations makes them ideally suited to disseminate business downloads, conduct sales polls or survey inventory. RMAs are often packaged from vendors with default or blank passwords. Creating unique user IDs and complex passwords can reduce the risk of data compromise and help facilitate compliance with the Payment Card Industry Data Security Standards (PCI DSS). Another example is about Network Security, transaction volume, brand recognition and the potential for sensitive data retention are all factors that make hotels (particularly franchise networks) juicy targets for hackers seeking to exploit insecure networks via the Internet. The hotel can install and maintain a firewall at all times.  Disabling a firewall can put a business at heightened risk of Internet attacks and potential system compromise.
Rebecca Pichora

Hackers snag a $1 laptop by exploiting flaw in point-of-sale systems | ZDNet - 0 views

  • Security researchers have devised a way to offer steep discounts or steal goods by hacking vulnerable point-of-sale systems.
  • SAP's point-of-sale (POS) systems don't authenticate or check internal commands, allowing anyone with access to the store's network unrestricted access to the checkout system.
  • All the hacker has to do is upload a new configuration file to the SAP Xpress server, which controls the checkout machines, to gain access to administrative functions.
  • ...6 more annotations...
  • change prices, set discounts, or take other malicious actions against the systems -- including remotely shutting down the checkout machines, or unmasking credit card numbers.
  • According to Dmitry Chastuhin, one of the researchers who identified the vulnerabilities, the flaw may be inherent across POS systems because they all use broadly similar infrastructures.
  • SAP has since fixed the vulnerabilities and rolled out patches.
  • n recent years, POS systems have become a target for hackers for stealing customer data and committing fraud.
  • When these are connected to the internet and rarely updated (if ever), systems are at further risk of malware attacks.
  • POS attacks cost retailers and customers billions every year. The number of attacks on POS systems, including ransomware attacks, are said to be declining, however.
  •  
    Due to the vulnerability of some POS systems, hackers have made the example of SAP whose POS system does not authenticate or check any internal commands, meaning if an hacker is able to get into their POS system they can change prices, add discounts and even disable the check out systems. Even though they have made the example out of SAP, it is said that this vulnerability is across almost all POS systems. One reason that this is happening is because many companies that run their POS system off the internet are not updating their programs, such as the windows, the internet explorer or the POS system itself. Today companies are very aware of the measures they must take to ensure their POS systems are safe as many breaches have happened causing many people to have their personal data stolen, therefore due to the efforts POS system breaches have been decreasing over the recent years.
laura kaczkowski

Travel Agents Increase Use of GDS to Book Hotel Rooms - 3 views

  • Advanced Search Search Products & Services    News Releases Close Send a release Member sign in Become a member For bloggers For journalists Global sites Products & Services Knowledge Center Browse News Releases Contact PR Newswire
  • he leading global provider of revenue generating solutions for hoteliers, clearly demonstrates how crucial Global Distribution System (GDS) platforms and GDS Shopping Displays are to travel agents:
  • 84 percent of respondents indicated that they were using their GDS platform the same amount or more often than in the past, with 35 percent stating that they are using GDS more.
  • ...8 more annotations...
  • where 26 percent of travel agents stated that they used their GDS platform more often than in the past and 19 percent said they used the GDS Shopping Displays more often than before.
  • "Travel agents are increasing GDS hotel use, and have once again confirmed their confidence in GDS Shopping and Booking Displays,"
  • Travel agents in 25 countries across the Americas, EMEA (Europe/Middle East/Africa) and Asia/Pacific regions who subscribe to one of the four major GDS systems were asked to participate.
  • n the survey, travel agents worldwide also indicated that promotional messages are effective and often prompt bookings: 66 percent of all travel agents surveyed who were aware of promotional messages requested additional information by looking at the screen attached to the promotional message.
  • "This survey definitively shows that promotional messages are not only an excellent way to reach travel agents, but also a valuable sales catalyst,
  • s the leading provider of revenue generating solutions for hoteliers across the globe. TravelClick offers hotels world-class reservation solutions, business intelligence products and comprehensive media and marketing solutions to help hotels grow their business.
  • is one of the fastest growing marketing research firms in the United States. With offices across the country and in Europe and partnerships with many of the largest companies in the financial services, consumer package goods, automotive, healthcare, media, technology and travel and leisure industries worldwide, PMI also offers advanced advertising and brand measurement along with direct marketing expertise.
  • Learn about PR Newswire services

    Request more information about PR Newswire products and services or call us at (888) 776-0942.

    Featured Video

    FEMA And The Ad Council Unveil New Series Of Ready PSAs As Part Of Ninth Annual National Preparedness Month
  •  
    In the article, "Travel Agents Increase Use of GDS to Book Hotel Rooms," it talked about how the leading global provider of revenue is generating solutions for hotels, it shows how important GDS platforms are to travel agents. "84 percent of respondents indicated that they were using their GDS platform the same amount or more often than in the past, with 35 percent stating that they are using GDS more." Back in 2009, when the last study was conducted, about 26 percents of travel agents said that they used their GDS platform more often than in the past. This study also states that the annual GDS shopping displays will be over $50 million in 2011, which will increase more than a million bookings compared to 2010. There was another survey that was done and they surveyed different travel agents from across the world that were subscribed to a major GDS system. In the survey the travel agents indicated that promotional messages are effective and often prompt bookings. Out of the travel agents they surveyed, 66% said that they were aware of the "promotional messages requested addition information by looking at the screen attached to he promotional message." From this survey it showed that promotional messages are an excellent way to reach travel agents and from reaching the agent, they also reaching the customer, it's a win-win reaction.
  •  
    I enjoyed the part about brand and promotional messaging, that is always a lure for me. When I see an attractive offer, evern If I'm not interested in booking or going to the destination, I often click on it anyway just to see the offer. It is a very effective marketing tool.
jrodr1102

Ransomware: One of Hospitality's Biggest Threats in 2017 | News | Hospitality Magazine ... - 1 views

  • After the attack made headlines for locking guests out for their rooms, the hospitality industry felt the first shockwaves of the top cyber security threat for 2017.
  •  
    Ransomware is a modality that takes digital devices hostage and prevents the user from accessing or generating information. Hackers then request the user to pay a ransom in order to recover access. Ransom money is requested in digital currency, usually Bitcoins. In 2016, an Austrian Hotel experienced ransomware for the first time. Devices were hacked and encrypted in a way that prevented hotel staff from programming room key cards and kept some guests out of their rooms. This risk could be mitigated by recognizing and acting fast at the signs of an attack. When the first devices have been compromised, staff can act by disabling other devices from being held hostage. Back ups can also save a company from being unable to access them in the event of an attack.
olaya5

How Smart Devices Will Change Hotel Technology - 0 views

  • ZigBee technology is just one new piece of a giant puzzle. Imagine you’re on a business trip and you have your WiFi device(s) of choice with you. You log onto your home security system and notice your garage door is open. With just one touch on your WiFi device you can close that door.
  • Smart Check-In
  • Time For Dinner
  • ...3 more annotations...
  • What About the Future
  • Computer eye tracking isn’t new. It’s available in the military, in specialized industries, for disabled people, etc., but these systems cost millions of dollars. To have it on your laptop is just fantastic
  • Think of what this technology will mean for your industry.
  •  
    Zig Bee technology in hotels is happening right now in some hotels that has been installed. This articles talks about the new techonology that let the user have control of almost everything. In the case of hotels, it will let staff to monitor guestrooms, public areas, and any place through their devices as long as they have internet conection. This techonology can go through walls, furniture, cabinets, and human body. An interesting feature of this is that it will eliminate the future use of batteries.
Jingjing Zhu

Core i5 vs. Core i7: What's the Difference? - 0 views

  •  
    Intel has three main processors, the i3, i5, and i7. However the biggest market for Intel is the primary mid-range processor i5. It is targeted at the heart of the market, with pricing that is not at budget levels but still affordable, and performance that is extremely quick but not the fastest Intel offers. Intel Turbo Boost is a standard feature on all i5, and i7 processors. As expected, the more you pay, the more you get. For instance, the Core i5 2300 has a base clock speed of 2.8 GHz and a maximum Turbo Boost speed of 3.1 GHz. The Intel Core i7 2600, on the other hand, offers a base clock speed of 3.4 GHz and a maximum Turbo Boost of 3.8 GHz. Another significant performance difference is how the Core i7 and Core i5 products will be handling hyper-threading. Hyper-threading is a technology used by Intel to simulate more cores than actually exist on the processor. While Core i7 products have all been quad-cores, they appear in Windows as having eight cores. This further improves performance when using programs that make good use of multi-threading. However, all Core i5, processors have hyper-threading disabled and all i7 processors have multi-threading enabled. This is a major difference of the two different core processors and gives the i7 an edge over the i5 processors. Last but not least, the average difference in price between the two different processor is about $80 dollars with the i7 processor coming out to be $294 and the i5 processor ranging from $177 to $216 dollars. You are basically paying for the difference of 100 MHz clock speed on the processor and the ability to have multi-threading capabilities.
Jessica Schwec

FCC: Marriott used Wi-Fi jammers to block customers' personal hotspots - Tech News and ... - 0 views

  • The FCC announced the results of its yearlong investigation on Friday, concluding that Marriott “intentionally interfered with and disabled Wi-Fi” networks at the Gaylord Opryland Hotel in Nashville, Tennessee. As a result of the investigation, Marriott will pay a $600,000 penalty to settle the complaint.
  • The investigation found that Marriott’s Wi-Fi monitoring system sent de-authentication packets to Wi-Fi hotspots. This use of radio frequencies to disrupt personal hotspots violated FCC spectrum use regulations.
  •  
    Follow this link to learn how a jammer works: http://electronics.howstuffworks.com/cell-phone-jammer1.htm Recently, Marriott was found to be noncompliant with FCC regulations that ban the use of any "Jammer"-to include cell, radio, Wi-Fi and others-by any individual or entity that is not an approved federal agent. The result? A $600,000 fine and removal of the jamming equipment from any Marriott property currently participating in the illegal activity. In a regular Wi-Fi network, a user connects to the Internet by connecting to the ISP, which could be a wired modem and separate Wi-Fi router or a combined wireless modem/router that will connect the computer to the ISP server and allow the user to launch their browser where they can search the web or access a particular URL. In Marriott's case, the company utilized a Jammer to prevent users from accessing their chosen ISP-their personal Wi-Fi networks, typically provided via cell phone companies. The jammer functioned by interrupting Wi-Fi signals that operated on a particular frequency. By placing their own Wi-Fi on a different frequency, Marriott's service was the only signal capable of connecting a user to an ISP service and the Internet and was therefore offered at a premium price. The management decision to utilize this technology was short sighted and over all a very poor decision. The decision was made based on the greed of money. By jamming competitors' signals, Marriott was attempting to force patrons into paying premium prices for Wi-Fi service during their stay, including large business accounts (meetings and events). What Marriott either failed to research or decided to ignore was the legality of such a decision. According to the FCC, Jammers of all types are strictly illegal except by approved Federal Entities and Agents. The Marriott management team made their own bed by making a poorly evaluated decision that has since come back to bite them in the rear.
ysuarez123

New app rates restaurant noise levels - 0 views

  • Consumers can use social media to rate a restaurant’s food, ambiance or speed of service. Now a new app will allow diners to rate the noise levels at their favorite eatery.The iHEARu app officially launched on Tuesday in San Francisco, the first city in what promoters hope will become a global network to help consumers find “ear-friendly” public places
  • More than 20-percent of the U.S. population has some hearing loss, and one in three people over age 65 have disabling hearing loss, she noted. But noise levels are also a concern for any guest looking to have a quiet business meeting, for example, or for a group looking to hear each other speak.
  • Users can open the app in any restaurant and map it, then press a button to make a recording to determine sound levels. Users can also add comments about their own subjective experience and share it through Facebook or social media.
  • ...3 more annotations...
  • The app is not designed to punish loud restaurants, but to give consumers crowd-sourced information about the most “ear-friendly” venues or best timing for finding a quiet spot.
  • Someone looking for a brunch spot, for example, could see how noise levels compare at 11:30 a.m. at a rated venue, compared with noon or later, Tremblay said.
  • In addition, restaurants can be certified as ear friendly based on commitment to certain practices, such as being willing to turn down music on request, having rooms or tables in quieter areas, using acoustical tiles or other sound-absorbing materials, sound isolation, table placements or other noise-reducing practices and, of course, being rated well by the app.
  •  
    Being in the food and beverage side of hospitality I tend to post mostly restaurant technology, this one specifically caught my eye as the restaurant I just recently left in New Orleans would always get complaints about how loud it was. With the new app iHEARu, users can measure the decibels in a restaurant as well as track how it changes at different times throughout the day. The app could help users find places to have business meetings, take someone who is hearing impaired, or even help families find a welcoming restaurant if they have younger kids or just patrons in their party who tend to be a bit louder. With the overgrowing effects of social media reviews on restaurants I found this rating system to be mostly beneficial. This would only lower the number of things a guest has to potentially complain about or upset other guests. Often diners don't realize how important noise level is to their experience until is it something that upsets them. Personally if I was going out with just my mom or sister, I might want something quieter so we could catch up, but if we are going out with my entire family we better pick a loud restaurant so we don't get dirty looks when we are inevitably yelling across the table. This app essentially helps all kinds of diners find the right fit for them.
agrie013

CaterTrax Launches AI Powered Accessibility Technology, CaterTrax Assist - 0 views

  • CaterTrax, a leading catering management software company, has announced the launch of their new assistive technology - CaterTrax Assist. The solution will offer users a fully automated artificial intelligence (AI) solution for web accessibility and ADA compliance.
  • Our collaboration with accessiBe provides the ideal solution for our clients.”
  • Once installed, CaterTrax Assist performs an initial scan of the website and activates an on-screen accessibility interface that allows users with disabilities to adjust the site to meet their needs. Every twenty-four hours, the site is rescanned and leverages machine learning technology to make continuous improvements. This new service provides a comprehensive solution for providers adapting to ADA regulations.
  • ...1 more annotation...
  • CaterTrax Inc., a business unit of Volaris Group, is an industry-leading catering management software company that was built by caterers for caterers.
  •  
    CaterTrax is a catering software that clients can add an event, order food, and set up the event the way they want. its a great system and is very intuitive. CaterTrax partnered accessiBe. acessiBe offers users a fully automated solution for web accessibility and ADA compliance. The way the CaterTrax Assist works is that it scans the website and looks at activities on the accessibility screen to adjust the website to the users needs. this shows that even event management software is trying to make the software accessible because they want to make sure that they "cater" to everyone.
npate083

5 Ways POS Is Changing (And Why It Matters) - 0 views

  • Businesses have moved from traditional cash registers and stationary credit card readers to iPads and even mobile- or cloud-based POS systems.
  • Breadcrumb, a restaurant cloud-based POS system
  • Square allows businesses to transform iPads and smartphones into a POS system
  • ...22 more annotations...
  • One e-commerce solution is Shopify's POS system
  • the Shopify POS synchronizes and streamlines your financial and product information in a centralized dashboard.
    • npate083
       
      Shared commerce streamlines financial and product information in a centralized dashboard. It provides the user with real-time data and customer insight without having to run reports on multiple systems.
  • real-time data and customer insights
  • without the hassle of running reports on multiple systems.
  • Businesses should consider allowing mobile payments, as customers are shifting away from cash. 
  • businesses don't need any heavy equipment overhauls
  • Mobile credit card processing services (Square, PayPal Here, Flagship ROAMpay) simply require a credit card reader attached to a smartphone or tablet with the necessary mobile app, while mobile wallet providers (Google Wallet, Visa Checkout, Apple Pay) and loyalty mobile apps (Starbucks, Daily Deals) allow customers to pay directly from their smartphones or by using a POS scanner to read barcodes or QR codes on their screens.
    • npate083
       
      Mostly everyone is switching to mobile payment. It is much easier and convenient. As a business, it is vital to have mobile POS system so customers can pay directly from their phone.
  • New POS systems integrate real-time transactions with CRM solutions to help businesses increase sales and boost revenue
  • POS integration lets businesses create client records, CRM tasks and email marketing lists
  • enable businesses to collect all types of customer data from POS transactions,
  • to improve customer experience and acquisition
  • ability to extract valuable information from POS transactions to help business owners make smarter business decisions.
  • POS software tool
  • data-gathering and reporting features
  • Detailed reports include inventory and volume analysis, top-selling items, revenue and profit margin optimization, and staffing needs
  • Toast is a POS system
  • "restaurant operations by combining POS, front of house, back of house, and guest-facing technology on a single platform"
  • "monitor restaurant sales, labor costs, food costs, and more in real time, at home, and on the go with powerful reporting capabilities."
  • , POS systems need more security as the technology advances.
  • (IoT) – the interconnectivity and communication of devices, networks and physical objects over the internet
  • POS systems are more vulnerable than ever to hacks and data breaches
  • US-CERT recommends protecting POS systems by using strong passwords, ensuring you have the latest POS software updates, installing a firewall, using antivirus programs, restricting unauthorized internet access (such as for purposes other than POS transactions) and disabling remote access to POS systems.
  •  
    This article sums up the ways in which POS is currently changing. These ways include by using shared commerce POS systems, mobile POS systems such as Square and PayPal, integrated real-time transactions with CRM solutions, and POS security. 
  •  
    This article sums up the ways in which POS is currently changing. These ways include by using shared commerce POS systems, mobile POS systems such as Square and PayPal, integrated real-time transactions with CRM solutions, and POS security. 
llibe010

The Top Five Cyberthreats Hotel Brands and Franchisees Need to Know About | Netsurion - 0 views

  • ay for guests, it also opens hotels to digital threats perpetrated by malicious actors. Consequently, hotel operators should be aware of the types of cyber attacks, which can significantly hurt their brand reputation and bottom line, not to mention the safety and welfare of employees and guests.
  • In January, for example, cyber criminals took over a luxurious Austrian hotel’s computer-controlled key-card system, locking 180 guests out of their rooms until hotel managers paid a nominal ransom
  • A ransomware attack may disable or alter performance of hotels’ computer-driven systems such as air conditioning and lighting, putting guests’ comfort and, worse yet, safety at risk. In addition, booking systems are extremely vulnerable to ransomware attacks because they process information belonging to the hotels, third-party applications and their customers.
  • ...18 more annotations...
  • 1. Ransomware:
  • hey present further ransomware opportunities to hackers by using computers to automate functions.
  • distributed denial of service, or DDoS
  • One of the largest data breaches in history was conducted through a third-party vendor when hackers stole data from 70 million credit cards by gaining access to a mega-retailer’s network through credentials belonging to an HVAC contractor.
  • 3. Phishing scam targeting customers and hotels:
  • 4. DDoS attacks on the hotel network:
  • 2. Remote hacking through third-party vendors:
  • 5. Theft of personal information over public Wi-Fi.
  • Statistics indicate that such incidents will become more frequent, so it is not a matter of if but when the next cyber attack will occur.
  • Integrate a managed SIEM. Hotels should bring on a managed security information and event management (SIEM) platform for their remote locations to be warned right away of cyber attacks. They may also want it for inside the perimeter if they lack the expertise and resources to properly use SIEM internally.
  • Maintain PCI compliance. The Payment Card Industry Security Standards Council (PCI SSC) has put forth a set of stipulations, the Payment Card Industry Data Security Standard (PCI DSS), in response to rapid PCI expansion. Hotels should make sure they are compliant with these regulations, which require businesses to send credit-card information in a secure environment, to prevent paying heavy fines and losing data, revenue, and customer trust.
  • Install antivirus on all devices. Hotels should ensure they have reliable anti-virus and anti-malware software installe
  • Train employees. Hotels should train employees to not open suspicious emails or links inside them as they may contain malware.
  • According to the FBI, the number of cyber threat occurrences quadrupled to 4,000 per day last year from 1,000 per day in 2015
  • In addition, there are large volumes of payment card transactions between restaurants, on-site shops, spas, parking, and the front-desk, ensuring there is plenty of customer data for a hacker to compromise.
  • The number of cybersecurity incidents worldwide increased 38 percent in 2015 from 2014, according to the Global State of Information Security Survey 2016 by PwC, CIO, and CSO.
  • Hotels are especially vulnerable to this type of attack where a type of malware disrupts access to a system until a ransom is paid. This is because they often use integrated POS systems
  • Hackers can break into hotels’ payment systems through a remote access point belonging to one of its vendors, so they should closely monitor third-party access to their networks
  •  
    This article outlines some of the main cyber attacks on the Hospitality industry. It exposes the threats due to the wealth of data stored in PMS, POS and CRM and suggests steps to take to protect against malware and randsomeware. The article further highlights the necessity for antivirus software on all devices.
  •  
    The article describes the five most common cybersecurity risks for hotel brands such as ransomware, remote hacking and DDoS attacks. The operational elements of each risk have also been discussed. It also covers best practices that hotels and other hospitality organizations can adopt to curb breaches.
jbrit055

Augmented and Virtual Reality in HoReCa - 0 views

  • Recent statistics prove that AR and VR are here to stay
  • under the conditions of isolation extended reality technologies seem like a light at the end of the tunnel
  • AR serves as a tool to enhance the physical environment (for instance, the hotel and its rooms), or reproduce the experience of exploring the location.
  • ...29 more annotations...
  • Augmented reality helps the hotel staff simplify the booking process by allowing the customer to experience an augmented model of the room.
  • they can be provided with the needed information in a contactless manner at any convenient tim
  • Virtual Reality cannot replace the feels of a real vacation but it can provide a clear understanding of what you should expect.
  • A valuable point for implementing VR is the emotional experience it brings to customers.
  • The joy of the VR experience is doubled by the opportunity to explore the travel destination before they purchase the tickets.
  • 360 video
  • Disabled people have more possibilities to discover new locations than ever before.
  • VR technology allows customers to search for destinations, compare hotels and other accommodations, and finally book rooms using a virtual reality headset.
  • ustomers explore virtual hotel rooms, experience local sights, and book a room effortlessly instead of basic scrolling and clicking on a website.
  • hotels are looking for ways to stand out and surprise their guests
  • Many hotels use virtual reality hotel tours as an opportunity to showcase their hotel rooms via interactive elements.
  • With the help of a smartphone camera, users can see additional information on hotel comfort as well as local benefits.
  • VR journeys can also provide a priceless opportunity to explore the world for people who are unable to travel.
  • VR headsets
  • They are small, wireless transmitters that work through Bluetooth to send signals to other smart devices nearby.
  • In a nutshell, they connect and pass on information to customers when they are in specific locations.
  • a virtual key to guests
  • help guests navigate
  • AR interactivity gives restaurants and other businesses the possibility to deliver digital experiences in a personal way, without risking the health of their customers or employees.
  • AR Food Menu with 3D View
  • AR-menu is not only an entertaining element for clients but also provides them with details like portion size, nutrition information, ingredients, allergens, and the number of people the dish can be served to.
  • AR-filters for social media that show immersive virtual experiences with the restaurant’s dishes.
  • Virtual renderings allow customers to see what their custom orders will look like without coming into the business in person
  • experience marketing
  • to make customers experience the product from the moment they enter the front door.
  • you can provide your customers with an AR experience while they are waiting for their order which makes the waiting time more entertaining
  • For restaurants, it not only helps people get more new customers but also allows restaurants to train their employees
  • Virtual Reality is an appropriate solution for decreasing the cost and improving the speed and productiveness of workers’ education.
  • Virtual Reality technology is promising not only for employees training but also for franchise development and marketing, analytical opportunities, and accelerated employee hiring.
  •  
    This article explained the benefits of AR, VR, and AI in the hospitality and tourism industry in order to enhance guest experiences and create smoother work operations. The implementation of this technology seems to be happening more due to the pandemic and hospitality companies are learning the best ways to use them to match the new needs of guests.
smend120

How AR, VR, and robotics can work together | Artificial Intelligence | - 0 views

  • How AR, VR, and robotics can work together
  • With the help of robots, businesses not only achieve higher efficiency but ensure the safety of their staff in hazardous areas
  • With the help of AR and VR, people can experience surreal atmospheres indoors as well as outdoors
  • ...18 more annotations...
  • Yes! Together, augmented reality, robotics, and virtual reality can be the ‘Three Amigos.’ VR and AR can offer an immersive medium to operate robots
  • With the help of low-latency networks, people can utilize robots remotely using intuitive AR and VR controls
  • Robot training
  • Virtual reality and augmented reality can be utilized to train robots for different tasks
  • With the help of dual neural networks, robots can learn new tasks by observing and breaking down several actions
  • he first network, known as the visual network, captures an image using the robot’s camera to understand the current state of an object. The other network, imitation network, tries to understand a demonstration and analyze how an action is being performed.
  • Motion sensors in AR and VR gaming can be deployed to train robots. Developers can use a pressure-sensitive trigger on a joystick to teach robots how to control grasping and articulation speed for picking up objects
  • Object recognition
  • Using this approach, robots can learn how to group similar objects together, differentiate between various objects, and identify new items that look similar to those it has already seen
  • Generally, AI-powered robots are exposed to a wide range of data.
  • By using VR, a trainer only requires a 3D VR model of several objects. With this approach, trainers and developers can minimize costs and effort required for collecting data and real-world objects. Using 3D models, robots can also be trained to recognize biological structures in the human body in detail.
  • Operations
  • Virtual reality can be used to develop teleoperating robots that can function with the help of multiple sensor displays.
  • obots replicate a user’s hand movements by using hand controllers
  • In a direct model, a user will be directly coupled to a robots current state
  • With a cyber-physical model, a user is separated from the robot.
  • Using controllers, users can guide hand grippers to move, pick up, and retrieve objects.
  • How AR, VR, and robotics can work together Augmented reality, robotics, and virtual reality can team up to develop innovative applications for various organizations.
  •  
    They can work together. Based on this article, this can be beneficial for all industries.
  •  
    Robotics, virtual reality, and augmented reality can work together to create cutting-edge solutions for diverse businesses. Businesses use robots to increase efficiency while also ensuring employee safety in potentially dangerous situations. Virtual reality and augmented reality, two contemporary technologies, have provided an immersive platform for media and gaming. People can explore strange environments both indoors and outdoors with the aid of AR and VR. The "Three Amigos" can be augmented reality, robotics, and virtual reality when they work together. Robot control using immersive technologies like VR and AR is possible. Business executives need to be aware of the potential benefits of combining virtual reality, robots, and augmented reality. Robots can be programmed to do a variety of jobs using virtual reality and augmented reality. There are two different kinds of neural networks: imitation networks, which attempt to comprehend demonstrations and examine how actions are executed, and visual networks, which use images taken by the robot's camera to understand the current state of an object. Dual neural networks can be used by organizations to enable robots to learn new tasks by monitoring and dissecting several behaviors. Robots that use artificial intelligence (AI) are exposed to a wide variety of data, which helps them learn how to distinguish between distinct objects, group related objects together, and recognize new objects that resemble what they have already seen. The expense and effort needed to gather data and real-world items can be reduced by trainers and developers. Robots can also be taught to recognize certain biological structures in the human body using 3D models. Virtual reality can be utilized to construct teleoperating robots that can function with the help of many sensor displays by employing hand controllers. The homunculus concept of the human brain, which postulates that there is a miniature human inside the brain that controls movement
1 - 17 of 17
Showing 20 items per page