Skip to main content

Home/ Hospitality Technology/ Group items tagged laptop

Rss Feed Group items tagged

13More

This $20 USB Cable Is A Dead Man's Switch For Your Laptop - 0 views

    • tcale003
       
      This article is about a new inexpensive technology called a Buzz Kill Cord. It has been recently created by Michael Altfield, a Software Engineer to prevent hacking across the globe for anti-theft protection if someone steals one of your computer or phone devices. This USB cable will destroy any and all information on your device.
  • Most people are familiar with the concept of a dead man's switch that, for example, activates the emergency brake should a London Underground train driver become incapacitated.
  • Most people are familiar with the concept of a dead man's switch that, for example, activates the emergency brake should a London Underground train driver become incapacitated.
  • ...10 more annotations...
  • Most people are familiar with the concept of a dead man's switch that, for example, activates the emergency brake should a London Underground train driver become incapacitated. There are many different technologies across multiple machines from the trains mentioned above right through to chainsaws. Unsurprisingly, laptop computers haven't been on the list until now. Software engineer and sysadmin, Michael Altfield, has created a cheap "kill cord" that can trigger a laptop to self-destruct if stolen by a snatch and grab thief. What's more, you can make your own for just $20 (£15) but there's an important caveat: this is for Linux laptops, not those running macOS or Windows.
  • Most people are familiar with the concept of a dead man's switch that, for example, activates the emergency brake should a London Underground train driver become incapacitated.
  • Most people are familiar with the concept of a dead man's switch that, for example, activates the emergency brake should a London Underground train driver become incapacitated.
  • le, ac
  • There are many different technologies across multiple machines from the trains mentioned above right through to chainsaws. Unsurprisingly, laptop computers haven't been on the list until now. Software engineer and sysadmin, Michael Altfield, has created a cheap "kill cord" that can trigger a laptop to self-destruct if stolen by a snatch and grab thief. What's more, you can make your own for just $20 (£15) but there's an important caveat: this is for Linux laptops, not those running macOS or Windows.
  • Although laptops can crash, the consequences will likely not be as devastating as a runaway train incident. So why would anyone want a "kill cord" for their laptop? Good question, and one answered by software engineer Michael Altfield in his blog posting that describes how he made one.
  • if you were doing some online banking or accessing your work network via a VPN, the opportunity to monetize the theft becomes apparent. That scenario isn't far-fetched either.
  • Stand up if you use your laptop in a coffee shop or some other public place like an airport.
  • I'm guessing nobody is sitting down at this point. Yet by using either distraction tactics or a more straightforward and violent strategy, a thief could steal your fired up and authenticated laptop in seconds. Encryption won't help much if you have authenticated and are accessing that data, or service, at the time of the snatch and grab.
  • Altfield wanted an anti-theft solution that could trigger the laptop to shut down, lock, or even wipe all data in such a physical separation scenario. "I couldn’t find a low-tech solution that implements a laptop kill cord," he said, "so I decided to build one myself." The result is what Altfield calls a "BusKill" cable.
2More

NiceMeeting's New Tool Allows Event Planners to Turn Attendees' Devices into Full-featu... - 0 views

  •  
    This article focuses on attendees using a modern day technology- mobile phones, tables and laptops at events and how event planners should engage more in incorporating them in to events and NiceMeeting, has done just that for event coordinators. NiceMeeting has introduced a presentation tool developed to enhance event engagements and maximize the value of knowledge exchange through live events.  Some cool features NiceMeeting also offers even planners is an AV application that turns attendees mobile device, such as iPad, iPhone, Tablet, laptop into a full-featured personal conference display.  
  •  
    This article suggests that the use of handheld technology, such as mobile phones, tablets, and laptops at events has become so widespread, that event planners need to incorporate them into daily use if they want an edge on business. Nicemeeting is just one of many new hospitality applications that enhances the event managing process for event planners. According to the article, it has the capability to turn technology, such as an Ipad or mobile device, into "a full-featured personal conference display." It creates an entirely interactive space. I think that this idea was brilliant, because regardless of whether people like it or not, cell phones are going to be present in the meeting space. This application makes the most of that occurrence and turns it into a positive thing.
7More

Improve Your Laptop's Wifi With A Wifi Antenna Booster * Expert Vagabond - 0 views

  • As a full-time digital nomad who works from his computer around the world, strong wireless internet connections are critical to my lifestyle. While I’ve been pleasantly surprised at the availability of wifi in many countries, there are definitely times when I wished my MacBook’s wifi card was more powerful.
  • ’ve discovered a fantastic solution to my relentless wifi addiction. You can buy a wifi range extender for your laptop, like the TP-Link N300 Wifi Antenna.
  • t increases my laptop’s WiFi signal strength 3 to 5 times
  • ...1 more annotation...
  • There are 2 primary situations when having a wifi antenna helps greatly. The first is when I’m staying at a hotel, guesthouse, or hostel and the wifi signal doesn’t reach my room.
  •  
    For travelers on the go, one frequently encountered frustration is the poor quality of WiFi signal in international destinations. This is especially true for business travelers.This frustration can be remedied however. by providing travelers with WiFi range extenders such as the TP-Link N300 Wifi Antenna. They can plug right into a laptops Ethernet port to extend its WiFi range by 200 yards or more! This represents an easy fix to a common problem for travelers and one that hotels should be looking into providing to guests. (It should be noted however, that more powerful AC technology is now available, replacing older N version network tech.) Providing this to guests would greatly enhance their quality of stay. Nicholas Reynolds- Hospitality Enterprise Technology Online
  •  
    I agree that a good wireless connection is vital to reaching customers and can really effect their stay. Connectivity has become such a big issue that it is in most hotel's customer satisfaction surveys as a metric for how the hotel is doing.
  •  
    This would definitely be beneficial for those whose job requires them to travel and to be constantly connected to the internet. Unfortunately in the world we live in not only is this important to business travelers but can also be important to families that are traveling on vacation where parents can not fully disconnect from their jobs. We all know the importance of receiving emails and txts from work that can be vital to your career.
24More

5 pressing hotel security concerns for 2012 - 2 views

  • areas of top concern for 2012, the usual suspects still top the list: information-technology breaches and terrorism, hoteliers said.
  • 1. IT
  • 2. Terrorism
  • ...9 more annotations...
  • 5. Security as taboo
  • 3. Skimmers
  • 4. Liability and insurance fraud
  • A related threat is that of “skimmers,” or devices that catch credit card numbers when consumers use them for payment. The problem primarily is contained to the restaurant industry, but Callaghan is concerned it could spread to hotels.
  • Ironically, one of the main reasons terrorism tops the list is because it has become less of an issue in recent years, sources said.
  • “The greatest business risk, as I see it … is insurance fraud. And it’s the most expensive,” he said.
  • The hot-button issue within the realm of hotel-information technology is mobile and cloud technology.
  • “Liability” as a general label refers to hoteliers being held liable for the acts, which are often criminal, of third parties, the AH&LA’s Callaghan said.
  • “Security” still is something of a taboo in the global hotel industry, said Paul Moxness VP for corporate safety and security at The Rezidor Hotel Group, a Brussels-based hotel management company, with more than 400 hotels and nearly 90,000 rooms in its portfolio.
  •  
    1. IT The hot-button issue within the realm of hotel-information technology is mobile and cloud technology.A company could have tens of thousands of smartphones or laptops in the field at any given point-each a potential gateway to hackers and other criminals. To the problem the core principle is to provide end-to-end data protection with looking at cost and benefit and how it's supports the business. 2. Terrorism Ironically, one of the main reasons terrorism tops the list is because it has become less of an issue in recent years.Hoteliers need to keep their staffs and travelers mindful of possible threats, but they don't want to scare them. 3. Skimmers A related threat is that of "skimmers," or devices that catch credit card numbers when consumers use them for payment.The best prevention measure is to have an investigative team or third party on hand and making that known to employees. 4. Liability and insurance fraud These two related issues can double, triple, quadruple and quintuple corporate insurance premiums in the blink of an eye. The advisement is hoteliers to educate themselves on the issue, consulting with an attorney, if necessary. 5. Security as taboo "Security" still is something of a taboo in the global hotel industry.Hoteliers need to do a better job of "turning on the light" by talking about security openly and regularly at staff and association meetings, and hotel executives should insist their GMs make security a priority
  • ...9 more comments...
  •  
    The first security matter that is brought up in this article is the cloud computing mobile devices on cell phones and laptops. With each device its own danger center of being hacked into a company's systems. The second point is "terrorists." Even though there has not been an issue with terrorists for about 10 years now it is still a big issue. According to the article companies are slacking on being vigilant because of the lack of activity.The third is what are know as skimmers, they are devices that gather information like credit card numbers.The last two issues are liability and security itself. Hotels claim to have security matters under control but when it comes to it, it is for show. Hotels need to buckle down on their security measures.
  •  
    "Terrorism and information technology breaches are familiar areas of concern on hotel security professionals' 2012 to-do lists."
  •  
    This article talked about five important hotel security concerns in 2012. As more and more new technology applied in the hospitality industry, IT professionals now face with challenges and risks associated with the new technology. When asked for the areas of top concern for 2012, hoteliers consider the usual suspects still top the list: information-technology breaches and terrorism. Hoteliers interviewed for this report recommended focusing on t five areas during 2012. The first concern is IT. The hot-button issue within the realm of hotel-information technology is mobile and cloud technology. Hotels have to protect data and information, especially the financial data. The second concern is Terrorism. Hoteliers need to keep their staffs and travelers mindful of possible threats, but they don't want to scare them. Thirdly, a related threat is that of "skimmers," or devices that catch credit card numbers when consumers use them for payment. The problem primarily is contained to the restaurant industry, but it could spread to hotels. The forth is Liability and insurance fraud. These two related issues can double, triple, quadruple and quintuple corporate insurance premiums in the blink of an eye. The fifth concern: Security as taboo. "Security" still is something of a taboo in the global hotel industry. Hoteliers need to do a better job of "turning on the light" by talking about security openly and regularly at staff and association meetings
  •  
    In the top 5 hotel security concerns, number 1 is IT Security. Many businesses now are working off of laptops and smartphones which is making it easier for hackers to get in to and steal information. The same goes for hotels which are becoming more hands-free, eco-friendly which is working off of computers. The hotel industries are spending more and more money on making sure that they are secure from any hackers logging in to their computers to get their guests information.
  •  
    When thinking about hotel security we do not necessarily jump to anything other than terrorism or things like that but in this article it talks about five different things that can be issues in hotel security. IT is a large issue due to mobile and cloud technology. There are so many devices used that it is easy for hackers to get in the system. Terrorism is of course an issue even though it is not so prominent as it has been in the past. Skimmers are becoming more popular in hotels and restaurants having someone working on the inside who swipes the credit card though a machine before processing the payment to take all of the information off of it. Liability and Insurance Fraud can be something as little as stubbing a toe to a large workers comp case. This is the most expensive security issue hotels face. Security is still taboo in hotels because it scares some guests but at the same time once one thing happens all of the bad things will happen. If nothing happens than it will stay like that.
  •  
    This article makes great points that we do not think about as normal people. Before taking this class I would never think of all of these issues that could be happening to me while at a hotel or restaurant but anything is possible.
  •  
    This article really made me think outside the box in order to enhance security, specially when in regards to IT, skimmers and liability/insurance fraud. All too common are people looking for ways to beat the system, we hear about it constantly but don't pay attention. From worker claiming worker's comp, foreign fingers and hazardous items in food, to Publix's ATM being the victims of attached skimmers and hackers attacking sensitive information transmitted by the world wide web. The best solution is to be proactive with training and technology and the benefits of being ahead of the curve.
  •  
    Great Article...hotel security is so important not only for the company but also for its stakeholders and consumers. It is the responsibility of the company to ensure that the correct steps are in placed to ensure guests and company information is secure. At my current job, it is my responsibility to ensure that employees are not utilizing credit card devices to catch customer's credit card information. We also address any possible theft concerns with the employees to ensure these issues are avoided.
  •  
    Great Article- There are so many security issues that we usually don't think about on a daily bases and this article highlights them well. Terrorism is something that has become rather laxed over the the last five years and usually the last security concern in the hospitality industry instead of the first that we process as a true risk. Concerns should also be focus on liability and insurance fraud from both guest as well as employees; a slip and fall and bed bugs can result in costly lawsuits.
  •  
    1. ITAccording to the article, most mobile devices that are used for business are unprotected. Meaning that the devices if the device even have a password and if it does the password is not very complex. There could be thousands of employees accessing company information via the cloud through unprotected smart phones or other mobile devices. This could organizations at risk to hackers and other criminals  2.  TerrorismAlthough terrorist threats are less of a concern nowadays, that does not mean hotel managers should discontinue stressing the importance of security within their establishments. Keeping employees aware and diligent can prove to be a delicate assignment but it is a necessary of part of maintaining a safe work environment in the twenty-first century. 3.  SkimmersSkimmers are devices that steal credit card numbers when consumers use them for payment. Unfortunately, it is most commonly an employee on the inside who is committing the crime.  A third party investigation team will be needed to prove who is stealing from the establishment.  4. Liability and Insurance FraudCombined, these two issues could sky rocket a company's insurance costs through the roof. It is crucial that hoteliers be aware of the legal system and educates themselves on issues concerning liability. Both patrons and employees alike could potentially file claims against an establishment and entitlements can quickly get out of hand.    5.  SecurityDespite the best security measures, there is always the possibility of unforeseen danger. This fear of the unknown is a concern for hotel workers. To confront this fear of the unknown managers must regularly and openly discuss security with employees.  Security should be held as a top priority. 
  •  
    This article discusses five main concerns brought on by the current state of hotel security. I must say that some of this information surprised me. Something that especially surprised me was learning that mobile devices that are used for business hardly use passwords. The article states, "Amplifying the problem is the sheer number of devices, he added. A company could have tens of thousands of smartphones or laptops in the field at any given point-each a potential gateway to hackers and other criminals." This piece of information is very unsettling to me. How could such valuable information not be protected? The article suggests the solution to this problem is PCI DSS. Terrorism as number two on this list also surprised me because that is not something that would first come to mind for me. The article states that it is ironically on the list for becoming less of an issue. I suppose this reminds hoteliers to never let their guard down when it comes to issues of safety and security within the hotel. However, "skimmers" and liability on this list does not really surprise me. The article suggests that hoteliers be educated about these issues to protect the hotel against them.
13More

Cloud-Based Event Planning Design Tool Set to Preview at BizBash Ideafest -- NEW YORK, ... - 0 views

  • The Plaza Hotel, Mandarin Oriental, The Pierre, Pier Sixty, Harriette Rose Katz of Gourmet Advisory Services, State of the Art, Marcia Selden Catering and Foremost Caters
  • core of AllSeated.com's unique usage includes creating and viewing venue maps, managing floor plans, table layouts, building guest lists, seating arrangements and the operational setup of an event. Venues can program in the specs for their own space using the services tools and then add various features like table and chair sizes, spacing specifications, placement and more
  • chance
  • ...9 more annotations...
  • AllSeated.com is the new and completely free collaborative tool that connects venues, event planners, vendors and event hosts in the cloud so everyone can work together from one centralized and secure website -- no downloads required
  • archaic and inefficient methods
  • a practice that wastes approximately $5 billion a year in manpower and operations costs
  • chance for a mismanaged seating chart to ruin the entire event
  • Event hosts can let their venue and event manager know they are using AllSeated.com so they can join in
  • Optimized for desktop, laptop and all iOS and Android tablets, everyone involved in planning the event has access to the service from anywhere, at anytime
  • Guest lists can be created in minutes as the tool allows hosts to import guests from social networks and email accounts.
  • An event is all about the glamour, best food and best music so it's great that we no longer have to give our customers a piece of paper for the layout but can offer them a state-of-the-art solution that will save an incredible amount of time, money and eliminate a lot of stress
  • AllSeated.com is an easy-to-use cloud-based event planning tool for venues, event planners, vendors and event hosts to seamlessly collaborate on the creation, updating and implementation of floor plans, seating charts and guests lists
  •  
    In the fast paced and often stressful world of event planning, a new innovative planning tool has been released that allows customers, vendors and anyone else the opportunity to see event layouts, menus, specifications and make notes on the event from either a desktop, laptop or even an android device. The event planning tool is called AllSeated.com and is completely cloud based which eliminates the use of the much antiquated way of writing everything down or showing a photocopy of a layout. Allseated.com also utilizes social media and to sync guest lists making it even faster for the client. With AllSeated.com, the hassle of having to book an event is eliminated and the customer can feel more at ease with their event on hand and the event manager can also have a much less stressful experience.
11More

Security Expert Exploits Hotel Network Vulnerabilities | Top Stories | Hospitality Maga... - 0 views

  • IP Telephone
  • unplugged the IP Phone and plugged the phone's Ethernet cable into his laptop. It booked up to his Backtrack Live CD
  • Jason Ostrom, Vigilar senior security consultant, was given access to a hotel room and told to find out if he could break into their corporate network through the IP TelephoneÃÆ’Æ'Æ'ÃĥÂ.ÃÆ’Æ'Â.ÃÆ’.Ã.•¬Ã…¡Ãĥ¬ÃÆ’Æ'Â.ÃÆ’.Ã.•¬Ã…¾ÃĥÂ.s network connection
  • ...7 more annotations...
  • Jason was able to penetrate through to the data network by using a combination of techniques he calls VoIP Hopping. This type of VLAN hopping attack is just one of the attack vectors being used by attackers today
  • As traditional voice and data networks converge, more avenues of attack open up
  • A regular PC should never have access to the Voice VLAN
  • Defense methodologies are in their infancy and are sure to improve in the near future
  • protect against VoIP attacks Ostrom recommends putting a firewall between the Voice and Data VLANs. By putting the Voice VLAN on a separate DMZ of a firewall, many current attacks can be thwarted. It is important to lock down the firewall so that only protocols used by IP Telephony are allowed to flow
  • Intrusion Prevention System (IPS
  • VoIP Hopper is available at http://voiphopper.sourceforge.net.
  •  
    An unssuspecting person check into a hotel like any normal person would. The ever so common exchange, credit card for room key took place. The only difference was that the person that checked had done so with other intentions. The "guest" utilized an IP Telephone that was in this hotel room to hack into the hotel credit card database and steal credit cards, transmit them to a foreign country and then have money transferred to his offshore bank account. This happened but at the hands of Jason Ostrom, aa Vigilar senior security consultant. Ostrom was able to unplug teh telephone in his room, plug in the phone's ethernet canle into his laptop and hack away. Of course, he did this as part of his job in testing a company's security agaisnt viral hackers. His company offers free security testing using a downloadable software called VolP Hopper This article was extremely interesting because as a frequrnt traveler as well as a perosn in the hospitlaity industry I was very shocked at the ease that the credit card information could be stolen. When it comes to credit card security it is of the utmost importance for companies to be PCI compliant and spend whatever it is necessary to safeguard the information of their customers. The detrimental damage that a security breach can have on a person can be debilitating as leaders in the hospitality industry we must do everything possible to prevent attacks like this from happening. made me become extra cautious about using my credit cards.
5More

Homeland Security Approves Their Right To Search and Seize Your Electronics Without Sus... - 0 views

  • the Department of Homeland Security quietly released a strangely worded document reaffirming their own right to search and seize your electronics without suspicion or cause, anywhere along the United States border (which they define as 100 miles in from the border – an area twice as long as Rhode Island).  In reality, this is nothing new, Homeland Security been doing this since at least 2009
  • For now, the business community has figured out a way around having the government search and confiscate devices with company secrets – give their employees blank laptops, and put the important information in the cloud.
  • Courts around the country are struggling to decide how to balance security with privacy.
  • ...1 more annotation...
  • In today’s world of cloud computing and ubiquitous screens, these protections are horribly inadequate
  •  
    Since 2009 Homeland Security has been searching and seizing electronics without suspicion or cause anywhere along the United States border. The business community has figured out how to get around the government searches by providing their employees with blank laptops and putting important information in the cloud. It has now been 25 years since Ronald Reagan signed the digital privacy protection laws which in today's rapidly advancing technology era these protections are inadequate.
8More

Cutting-Edge Audience Feedback - Meetings And Conventions - 0 views

  • Audience-response systems (ARS) have become more sophisticated and portable, allowing presenters to ask questions on the fly and attendees to get involved in a program's content.
  • You can use it for surveys and evaluations. You can use it to engage attendees. You can use it for gaming. You can collect valuable information that you can publish after the event. You can grab it all with one tool
  • Devices also can be individually assigned to attendees to count attendance for crediting purposes
  • ...4 more annotations...
  • the IML Connector has a more powerful microphone, eliminating the need for a fleet-footed helper to run the mike around the room. An extra feature is a speaker, allowing attendees to listen to simultaneous interpretation through the handset or headphones.  
  • No computer is needed when the devices are paired with the handheld base unit, called the Reply Solo, which gathers the answers and displays the results.
  • Each transmitter has a small LCD screen that indicates which answer the attendee has chosen.
  • As long as Wi-Fi is available, responses to Poll Everywhere surveys also can be sent in by laptops, iPads and iPod Touches. And answers can be tweeted and still come straight into the presenter's PowerPoint slides in seconds
  •  
    Technology absolutely plays important role to facilitate meetings and conference running smoothly. The Audience-response systems (ARS) ease the communication between attendees and speaker, which encourages the engagement from participants. As one big goal of meeting and convention is to bring people together and let them know each other, technology like ARS is essential for a successful meeting. According to most planners' experience, it's really annoying to pass around the microphone when somebody wants to ask question. The new microphone function is also added into ARS so that attendees can ask question without waiting for passing the microphone. In addition, ARS can track attendance for crediting purpose. As long as WiFi is available, surveys can be sent by laptops, iPads and iPod touches.
9More

Top 5 Digital Marketing Trends for Hospitality Industry in 2015 | Ravish kumar | LinkedIn - 0 views

  • In hospitality industry, it’s important to be vigilant and on the move - take a closer look at how hoteliers embrace the upcoming challenges with the latest technology
  • Adapting digital marketing plans and gain the advantage over your competitors
  • eMarketing- Marketing, sales, public relations and advertising are some of the key elements of emarketplace.
  • ...5 more annotations...
  • Content is still the King- Content will lead the way, as long as you create smart & high quality content for visitors coming to your website.
  • Customer Experience Wins over the Sales Pitch- It’s the fact that prospects turn down those hotel marketers who do nothing else but just sell!
  • Call to Action- A strong call-to-action is what engage the prospects and drives them to make further bookings.
  • Be Mobile Ready- The immense growth of mobile world (smartphones and tablets) is s quickly surpassing the age of desktop, laptop and personal computers
  • Put together these five key pointers and stay on top of all the latest developments in digital marketing.
  •  
    Online marketing consultant and social media strategist Ravish Kumar shares five necessities for hospitality industry succcess when marketing in the digital age on LinkedIn. Of particular note is that this article was created in 2015, and likewise mentions the very critical transition from the popularity of desktops/laptops to the rise mobile phones as a crucial element to current emarketing.
5More

Tourisphere- The role of information technology in tourism industry - Daily Observer - 0 views

  • IT relates to tourism in many ways hence the only option before the advent of IT globally if you wanted to travel any where you have to walk from your house down to the street to get the local agency either as outbound and inbound tourist.
  • But with the advent of IT this can be done online, sitting on your bedroom as a tourist you can get all the necessary information without stress, this is just a matter of settling down with your laptop in your house and log into your desire website. So IT opens up the possibilities for tourism.
  • Now information technology is being used for a variety of functions in the tourism industry, ranging from an internal organization role to external communication between different parts of the industry.
  • ...1 more annotation...
  • oday, a wide range of tourism sectors is taking the advantage of the information superhighway. Technology facilitates the speed and efficiency with which information of the tourism industry is processed, stored, retrieved, distributed and otherwise manipulated.
  •  
    In the article Mr. Lassana Tunkara talks about the positive impacts information technology has on the travel agencies, tourism industries and individuals that uses the internet. Everybody is becoming computer literate since it's the number one means of communication through the internet. Information technology has taken over the world. In the past if you want to book a vacation, you would have to find the closest travel agencies to you. You would spend a couple days in the travel agent office looking through brochures. With the advance in information technology, you can do so from the comfort of your home with just your laptop and an internet connection and logging to your desire website. The tourism and travel industry depends a whole lot on the internet as a means of communication, through emails and other forms of communications. With the advance in information technology cost is reduced, the speed at which information is transferred and retrieved has increased. Information technology has transformed the tourism industry, it changes the way the services are delivered and customers' expectations are much higher. With the internet all these industries are able to communicate with each other, such as travel agencies, airline, hotel and car rental companies. Doing reservation is much easier for everyone involve, it can be done anytime and anywhere without having to sit in a travel agencies office going through tons of brochures.
4More

Notes From an IT Service Shop: Every Hotel Computer Should Have at Least Two Internet B... - 1 views

  •  
    This article is about why hotels should use atleast two internest browsers. Simple yet very informative article about how two browsers can not only ease operations but also prevent problems that sometimes occur in browsers. The article is filled with lot of day to-day problems of browers which can be so easily be prevented. Having a hospitality business with so much online activity in todays world , this article shows how simple it is to manage online activities. A must read.
  • ...1 more comment...
  •  
    Actually I use two internet browsers on my computer. The Firefox and the 360. They have their own advantages and I use them to open separate pages. And when I used to internship in business center in hotel, I found it is really necessary because according to kinds of requirements from customer, only one browser sometimes can not satisfy customers. So no matter for what reason, for customer service, for information collected, or development of hotel, there should have at least two browsers.
  •  
    Most of the time, two browsers work perfectly fine on the laptop. I think it's necessary to install to browsers just in case one of them doesn't work fine sometimes. However, the two browsers on my laptop would conflict with each other. There was a period that I could not open them at the same time otherwise my laptop will completely shut down. For the hospitality industry, installing two browsers may benefit the guests. It saves guests time and money when they use the computer devices with two browsers because it provide them two ways to browse the internet.
  •  
    I totally understand that there are lots of benefits to have at least two browsers. Actually I used to have more than two. And I was happy at that time that I have more than one browser because my Internet Explorer was infected by a virus and my computer would shut down by itself with no reason each time I opened the explorer. I didn't have time to fix my computer and remove the virus because I was preparing a final paper and I had to turn it in next day. So I just easily searched for information through other website browsers. For a hotel, that would be more important to keep the daily operation smooth with more than one browser in case that one of them was not working.
2More

How Windows 8 Could Change Your Life - Or Not | Upgrade Your Life - Yahoo! News - 0 views

  • At this year's International Consumer Electronics Show (CES), a Chinese company called Compal unveiled a prototype laptop with a removable touchscreen — and that screen becomes a tablet.
  •  
    Microsoft is releasing in October 2012 the new version of the most popular computer operating system Windows 8. This new feature is not only for laptops or desktops, it is mainly focusing on touch screen devices. Lenovo also unveiled their Lenovo Yoga hybrid. This computer allows you to tuck the keyboard flat behind the screen and transform the device into a tablet shape, it can rotate 360 degrees. Windows 8 allows you to put your favorite app such as Facebook or Twitter into the start screen, you can add more apps, customize them and it refreshes constantly so the information stays current.

5 Technology Devices used for Event Planning - 0 views

started by Marisa Chauvet on 18 Jul 13 no follow-up yet
2More

Hotel bandwidth issues grow with guest demand - 0 views

  •  
    "Hoteliers face many obstacles when attempting to offer guests blazing Internet speeds, not the least of which is the fact that guests tend to all want to use it at the same time, putting pressure on the bandwidth coming into the property along with the wireless networks that support laptops, tablets and smartphones. "
  •  
    I love this article because the hotel that I used to work at we upped our internet speed over 20 times while I worked there. It just goes to show that so many people are starting to use more streaming services such as netflix and more people are doing more work and also, if a family of 5 comes to stay in your hotel think of how many different devices that ONE family is using. I bet they each have their own cell phone, tablet, computer, etc. It also doesn't help if you have a conference where there are hundreds of people using laptops and tablets. What is the hotel industry going to do about this issue?
11More

InnQuest Software - How Future-Proof is Your Hotel Property Management System? - InnQue... - 0 views

  • To be as future-proof as possible, your PMS most also offer revenue management capabilities, staff scheduling, guest loyalty features and a channel manager that provides you with access to a world of potential booking sources.
  • When the provider monitors your hotel PMS 24/7 and it is cloud-based, you’ll lessen your hotel’s IT security burden because you’ll only need a Web browser and Internet connection to access the PMS. This also allows you to benefit from the latest server security updates to deter attackers.
  • Link a PMS to the right external systems, and you’ll reduce duplicate workload, all but eradicate human error and be able to provide new guest services in high demand.
  • ...7 more annotations...
  • Your hotel property management system software is the heart of the hotel’s technical operations, but it will benefit significantly from integrations with third-party systems
  • If your current provider seems uncomfortable divulging information about either its PCI compliance or preparations for the GDPR, then it might be time to look for a replacement.
  • A hotel PMS that is not GDPR-compliant can cause a hotelier to face potential legal and liability issues. Hotels must obtain, store and process personal data to provide the best possible guest services.
  • To process guest credit cards securely and in a manner that makes your hotel compliant, you’ll need a hotel property management system which has embraced the PCI standard.
  • A cloud-based hotel PMS enables the housekeeping & maintenance staff, for example, to receive room cleanings and maintenance requests in real-time with powerful desktop and mobile tools.
  • If you can’t access your PMS with a mobile device, such as a tablet, or a laptop computer with a WiFi Internet connection, then it’s missing, perhaps, the most important piece of future-proofing required.
  • The Hotel Property Management System (PMS) is essential for guest satisfaction and business success.
  •  
    This article discusses the importance of a hotel being up to date with their PMS system and all the features a PMS system could have. The article states that cloud-based PMSs accessible to hotel staff via Internet through a phone, table or laptop is essential for the future of PMS and will enable the staff to stay up to date in real time. Additionally, a PMS system that is PCI compliant is necessary to protect guest personal information and will allow the hotel to provide better guest services and satisfaction. Another feature listed was to ensure the PMS is integrated with third-party systems such as two-way OTA interfaces and credit card processing platforms. This will help eliminate human error and lessen workload so employees can concentrate on delivering the best guest experience. Also mentioned was the fact that a cloud-based PMS offers security updates that will always be compliant to the latest standards of cyber security. With staff scheduling and revenue management capabilities, PMSs are a much more integral and important part of hotels success than ever before. It is imperative for a hotel to be up to date with their PMS so they don't fall behind their competition.
4More

Hyatt Transforms In-Room Television Into Connected, Interactive Entertainment and Conci... - 0 views

  • “Imagine a world where you can use your hotel room television to place your room service order, book a local tour, stream a movie from your Netflix account, and download a document to be printed at the front desk,”
  • “This is the future hotel experience at Hyatt.”
  • “The consumer appetite for new and fun in-room technologies has been far outpacing what most hotels offer.
  •  
    Forget about whether there is free wifi in room or not when travelling. Hyatt Hotels Corporation has introduced the internet accessed In-Room television where basically your In-Room TV not only performs the normal functions, but everything you can possibily imagine with your laptop, mobile phone, etc... from browsing websites, ordering room service, dinner reservations to receiving customized messages from meeting and group planners and much more! With this new service, I would simply see it as an electornic bulter where every guest could enjoy whenever they stay with such properties.
2More

9 Tips To Block Hotel Wi-Fi Malware - Security - Mobile Security - - 0 views

  • 9 Tips To Block Hotel Wi-Fi Malware
  •  
    FBI issues warning to people traveling abroad that free Wi-Fi systems can pose a threat. Malware and other attacks on hotel wi-fi has become a bigger and bigger threat for hotel internet users.  This artical introduced 9  tips to use wi-fi safely.  1. Update Before Leaving 2. Block Pop-Ups  3. Handle Free Wi-Fi With Caution 4. Read Hotel Wi-Fi Directions 5. VPN Tunneling Secures Free Wi-Fi  6. Download Software Updates Directly From Vendors 7. Beware Wired Hotel Connections 8. Consider Using A "Burner" Laptop  9. Don't Be Afraid To Hibernate  All these tips indicate that to use internet safely, we should be alter to potential risks, be wise and have a good habit when access internet. 
7More

Hotel guests spend more on telecom; 38% rise in past two years - USATODAY.com - 0 views

  • The way travelers communicate on the road has changed dramatically over the years, and these changes become evident when analyzing the revenue earned by U.S. hotels from their guests for use of telecommunication devices and services. In lodging industry parlance, "telecommunications revenue" includes monies received from the guest use of hotel room phones, fax machines, and internet connections.According to our research, telecommunications revenue at the average U.S. hotel in PKF's annual Trends in the Hotel Industry survey sample has declined by 79% since 2000.
  • Internet fees help drive growth in telecom revenue
  • Tiered Internet pricing: Here to stay?
  • ...1 more annotation...
  • to tell us about the state of the industry's telecommunications revenue stream - a stream that includes Internet fees.
  •  
    "The way travelers communicate on the road has changed dramatically over the years, and these changes become evident when analyzing the revenue earned by U.S. hotels from their guests for use of telecommunication devices and services. In lodging industry parlance, "telecommunications revenue" includes monies received from the guest use of hotel room phones, fax machines, and internet connections."
  •  
    This year, travelers are on track to pay U.S. hotels an estimated $1.95 billion in fees and surcharges - an amount that includes unpopular Internet charges. With this in mind, Hotel Check-In asked Robert Mandelbaum, the Atlanta-based director of information services for PKF Hospitality Research, to tell us about the state of the industry's telecommunications revenue stream - a stream that includes Internet fees.
  •  
    Over the years, with technological and telecommunication advances the way we communication while on the road or on vacation has changed. I remember going on vacation as a child and being able to call my grandma from our hotel room once a day because we didn't want to spend too much money on calling back home or getting a voicemail from family members calling while we weren't in the hotel room. Over the years, this has changed dramatically. Now I can go on vacation and call, text, send emails, pictures, and videos to all my contacts with the use of my cell phone or with the use of my laptop in a WiFi area. This article gives insight on the revenue provided by telecommunications as told by Robert Mandelbaum a director of information services. He tells us that internet fees help with the growth of telecom revenue, as use of in room phones has decreased. This is just one way that the changes in technology have affected the industry. In this case, telecommunication advances have had a negative effect on the revenue in telecommunications but its only a matter of time until something new comes around and attempts to restore profit production. 
2More

INNCOM's In-Room Controls Now on Intelity's ICE Touch for iPad | Green Lodging News - 0 views

  • By adding INNCOM’s Integrated Room Automation Systems (IRAS) to Intelity ICE (Interactive Customer Experience) Touch on iPads, guests can now control room temperature, lighting, drapes and alarm clock directly from their iPad tablet computers—even when they are not in their rooms. INNCOM is an industry leader in advanced guestroom automation systems for hotels and resorts. IRAS is INNCOM’s customizable multi-purpose platform for in-room guest controls. Intelity is the hospitality software developer of ICE, the award-winning integrated, customizable, branded interface that enables hotel guests to request all services instantly via in-room tablet, TV, laptop or mobile device. “By placing the INNCOM IRAS on our ICE guest interface, Intelity is giving travelers real-time fingertip control over their hotel experience,” said David Adelson, Intelity founder, president and CEO. “Once a guest has registered with the hotel, downloaded its app and received password authentication, they can begin interacting with the property via ICE from virtually anywhere.”
  •  
    This is article speaks to room automation in guest rooms as a means to make hotels more green. Through the INNCOM system, hotels are able to customize the guest's stays by allowing them to adjust the lights and temperature. It also allows hotels to reduce cost as they are able to turn off HVAC units and turn on automatic lights. By allowing hotels to do this, they can save money on their utilities. With the INNCOM system, hotels also can upload their room collateral which reduces the cost of print for the hotels.
21More

Stop, look and listen before investing in hotel tech - 1 views

  • the hotel industry has been hooked on placing more and more technology into guestrooms believing the guest wants it, needs it. It’s become a way to stay competitive.
  • Hotel owners started to question the cost and ROI. As operators, you became increasingly concerned over recurring support expenses
  • Oh, and one must not lose sight of the fact that there is the obsolescence factor with many of the items being superseded by new models at an ever-quickening pace
  • ...15 more annotations...
  • Less is more
  • Why are you adding connectivity panels so the guest can tether their device to the TV, when most are very comfortable at either holding it in their hand (like a book) or prefer to connect it wirelessly?
  • To understand what the guest really wants and needs: STOP, LOOK and LISTEN!
  • What travellers want in hotel technology
  • Super-fast, reliable and suitably priced Internet access
  • A well-lit room with simple controls
  • Power sockets
  • Temperatures that can be easily controlled
  • A place to work
  • And as for the TV, include 24-hour news channels, sports channels and some entertaining TV channels.
  • Actually, you can summarize what guests want from a hotel room with three Cs: 1. Clean2. Comfortable 3. Connected
  • They just need the tech to work
  • What does this mean to YOU, the hotelier?In my opinion, going forward, guests will start to question why they should pay for this tech when they don’t need it, don’t want it and, most importantly, don’t use it.
  • A trendy piece of tech is no longer an enticement to make a guest change allegiance from one hotel to another. A B&O stereo or an iPod dock is not a deal breaker, but free Wi-Fi and a free mini-bar can be.
  • And besides, the lifespan of these toys is very short—12 to 18 months tops—before they become relegated to the old-version league. Can you really afford to swap out gizmos that fast?
  •  
    "Stop, look and listen before investing in hotel tech"
  •  
    This article first reviewed the technology revolution in hotels. From the telephone, TVs, to today's mini bars and electronic door locks. Why hotels install more and more technology into guestrooms? Because the hotels believe the guest wants it, needs it, and it's become a way to stay competitive. However, the high technology gives brings them competitive advantages and also provides convenience for the guests, at the same time, it also carries a high cost with it. How to select the best technology and how to make best use of the technology? The author suggested the hotels should Stop, Look and Listen before investing in hotel technology. First, the hotels should justify the reasons to set the expensive devices. How to make sure the devices is useful and worth that much money? The hoteliers need to see whether the guests really want and need the technology. Consider very carefully the kind of tech you are deploying. Is it because you feel threatened by what your competitors are doing? Remember they may be on the wrong track. It is important for hotels to understand what the guests really want and need and before investing the new technology, the hotels need to stop, look and listen.
  •  
    When it comes to investing in technology in hotels, a better approach might be to simplify. In a day and age when most people carry around all their technology needs in their pockets (Cellphones, Tablets, Laptops, etc.) There may not be a need to invest so heavily in gizmos to attract customers and keep them happy. We may want to consider that all the guest wants is to be connected, so offering a super fast, reliable and suitably priced internet access is all the technology they really need. Investing in every new technology, with short lifespans, can end up making a real dent in your ROI.
1 - 20 of 98 Next › Last »
Showing 20 items per page