Skip to main content

Home/ Hospitality Technology/ Group items tagged leaks

Rss Feed Group items tagged

anonymous

HITEC Wrapup - Guestroom Energy Management Innovations Grab Most Attention :: Hospitali... - 0 views

  • The following is a summary of the HITEC announcements having some type of “green” connection:
  • INNcontrol 5 energy management and guestroom automation control system.
  • INNcontrol 5 gives hotel operators better insight on how to optimize energy use by generating historical trend reports on room usage, seasonal fluctuations and other factors.
  • ...21 more annotations...
  • The INNcontrol 5 system provides the open data exchange platform for Internet of Things (IoT) integration with centralized electronic locks, property management systems, in-room entertainment and other systems. INNcontrol 5 is also an entry point for consolidated Alexa voice control of compatible HVAC lighting, drapery and, amenity controls.
  • Honeywell also debuted and demonstrated its new Spectre guestroom solution that merges smart thermostat technology with guestroom lighting controls. Spectre combines Honeywell’s e7 occupancy-detection wireless thermostat with intelligent, programmable wall outlets and lights to extend energy savings to guestroom lighting. The thermostat senses when guests enter the room and instantly communicates with lighting controls via a 2.4GHz RF to activate a “welcome” environment. When the room is unoccupied, the lights and outlets are turned off within a 30-minute time period to save energy.
  • For hotel owners, the data and analytics supported by Honeywell Sentience and displayed in INNcontrol 5 helps make properties more energy efficient. For operators, artificial intelligence enabled by Honeywell Sentience can predict heating, ventilation, and air-conditioning problems before they occur.
  • Telkonet, Inc., creator of the EcoSmart platform of intelligent automation solutions, announced the release of its Symphony commercial IoT platform. Some of the key highlights of Symphony’s capabilities include the ability to see all room devices, including door locks, lighting, mini bars, shades, etc.
  • Just prior to HITEC, SONIFI Solutions announced a collaboration with Telkonet, Inc. to make hotel rooms smarter and more connected, by combining energy management solutions with in-room guest entertainment systems. Guests have the ability to change in-room environmental settings via SONIFI’s STAY Interactive Television interface.
  • Evolve’s New Evolve Guest Interface
  • a simple, yet powerful device that enables guests to control in-room climate, lighting, shading and drapery, as well as other functions to increase efficiencies for both guests and staff.
  • The eGI consolidates devices such as the guest-controlled thermostat, special devices for lighting and shading control, IoT gateway, USB charger, alarm clock, and platform for Guest Services applications—all within the device.
  • CIRQ+ & Its ‘Smart Room for Smart Guests
  • Mode:Green, a company focused on hospitality, specializing in technologies, including: HVAC, lighting, video surveillance systems, television, audio and voice on demand, motorized shading, Wi-Fi and networking, door locks, and more.
  • Verdant EI Energy Management
  • The system continuously analyzes changing conditions in each room—occupancy, temperature, humidity, weather, etc. and adapts in real time.
  • When hoteliers subscribe to Verdant EI, a dedicated energy management expert is assigned to the property with a simple goal in mind: monitor the Verdant system 24/7 and maximize energy savings.
  • Amana expanded on its guestroom energy management system with its new DigiWatt system that can control virtually any electrical circuit in a hotel room. Using a DigiSmart occupancy sensor to determine if a room is unoccupied, the system can shut off power to virtually any 115 volt non-critical electrical circuit(s) that are predetermined during design and construction.
  • INTEREL’S Guest Room Management Solutions
  • The Water Management System delivers precise digital water controls and enables the property or brand to set water flow and temperature policies. Guests can control multiple water outlets through one touch panel.
  • Site 1001 can monitor a building’s water supply system and warn when it detects a leak or conditions favorable to bacterial, viral or parasitic agents.
  • wireless control of temperature; smart LED light; instant-on alarm clock; Wi-Fi (ZigBee, Zwave); thermal occupancy sensor; Bluetooth speaker and Hi-Fi audio; 120 V AC and USB 2.1A charging plugs with optional (Qi) wireless charging; hotel services; and more.
  • AspirEnergy, an energy solutions company, was on hand to help commercial properties increase long-term value by reducing operating costs through sustainable solutions. AspirEnergy offers many services—ranging from lighting retrofits to energy management systems to assistance with renewable energy systems and energy procurement.
  • Coway USA, Inc. its Airmega and Aquamega air and water filtration systems. The Airmega includes a pollution sensor to show the air quality in real time.
  • When the air quality in the room remains good for 10 minutes or more in Smart Mode, Airmega conserves energy by shutting down the fan.
imontenegro

MGM Grand in Las Vegas Implements New Security Policy -- Security Today - 0 views

  •  
    A leaked MGM Grand memo posted by Vital Vegas states that beginning Feb. 4, "All guest elevators at MGM Grand will be modified only to allow access to the floor to which the guest is registered.
  • ...2 more comments...
  •  
    Guests will only be able to access the floor on which their room is located and will not be able to take the elevator to other floors.
  •  
    "With all those things that have happened in the past here, like 1 October and all the security things that people are thinking about being safe - I understand why they're doing it," said Richard Strader, the former Vice President of Security at the Hard Rock hotel-casino.
  •  
    An MGM spokesperson told KTNV, "Our processes and procedures are always evolving as part of our focus on providing the best possible service and keeping guests and employees safe." The spokesperson said that the security change is not in response to any specific incident
  •  
    The MGM Grand in Law Vegas is implementing new changes into their security protocols in response to different violent events that have occurred within the last few years. Changes like this are necessary to "stay on top of the bad guys". In the past, anyone had access to most floors in the hotel. Additionally, this will allow the hotel to track and record any suspicious movement occurring and report it.
msbode

Ensuring Software Integrity in IoT Devices - 3 views

  • oT is defined as the Internet of Things. The Internet of Things refers to the ever-growing network of physical objects that feature an IP address for internet connectivity, and the communication that occurs between these objects and other Internet-enabled devices and systems
  • Gartner predicts that there will be 20.4 billion connected Internet of Things (IoT) devices by 2020, with 5.5 million new things getting connected every day
  • more than half of major new business processes and systems will include an IoT component by 2020
  • ...9 more annotations...
  • Manufacturers are rushing products to market with little or no thought to security, often including hardcoded passwords or known vulnerable software libraries. While this problem is most obvious in the consumer space (which gets the most news coverage), vulnerable IoT devices are present in every business sector as well
  • The TPM stores secret keys, passwords, and digital certificates in its secure internal storage protecting them from software and physical attacks. The TPM acts as a root of trust for checking platform integrity at boot time (i.e., check against any malicious change). A cryptographic hash value of the platform configuration is calculated and compared against the precomputed hash value of the platform. Access to the platform is denied if the integrity check fails [4]. This is the beginning of the “chain-of-trust” for software modules that are subsequently initiated. This transitive trust mechanism is one of the important security features in trust computing. It uses the trust root as a starting point to establish a chain of trust model, in the order of trust root, boot loader, OS, and Application.
  • Secure boot provides the foundation for Trusted Boot, which extends the trust boundary to the boot process and eventually the operating system.
  • software attestation attempts to achieve a dynamic root of trust without specific hardware support. This method has the advantage of not requiring any stored secrets (cryptographic keys or passwords) and allows applications or modules to be updated, which may not be possible if hash values are stored in immutable formats, such as a TPM chip
  • While Secure Boot validates the platform and firmware, Trusted Boot is generally defined as verifying each software module before execution and extending the chain-of-trust to the entire operating system. During the boot sequence, the digest of each executing program is recorded before it executes. A TPM (Trusted Platform Module) is used to store all these records and then report on them securely.
  • It is important to note that Trusted Boot requires a TPM chip so the operating system can see the chain of execution, thus it may not be an option for some IoT devices. Lack of trusted boot support would allow an attacker with physical access, or using a software vulnerability during run time, to potentially modify the stored code and compromise the device.
  • There are many other attack possibilities to consider with IoT devices. For example, existing TPM architectures do not support runtime integrity checking and this allows attackers to exploit vulnerabilities to modify the program after it has been verified (at time of check or TOC) but before the time of its use (at time of use or TOU) to trigger unintended program behavior, such as the execution of malicious code or the leaking of sensitive data
  • Physical attack is a viable method of compromising the integrity of a device. Modifying and replacing firmware by an attacker may be worth the effort, depending on the perceived value of the device or the data it may access (such as a video camera or ATM). Attackers can go as far as removing memory and reading its contents.
  • a device built today can become a major problem tomorrow
  •  
    The purpose of this article was to review the available literature on the subject of ensuring software integrity for IoT (Internet of Things) devices, focusing on detecting and preventing modification of the original software, so that the device cannot be used for unintended purposes. The literature reviewed; secure boot, trusted boot and runtime security. Concluding that no one single control is going to adequately protect a device the solution based upon 25 years of experience is to create a multi-layered approach to security that starts at the beginning when power is applied, establishes a trusted computing baseline, and anchors that trust in something immutable that cannot be tampered with. Additionally, because a device built today can become a major problem tomorrow, due to them having hardcore keys "set and forget", the internet will then have literally billions of obsolete hosts in the coming years. Therefore it is important for MIS Managers/ Consultants investigate how to change the game in order to mitigate the damage or economic value of new systems being breached and by asking questions such as 'Can we even in the presence of a malicious attacker offer some limited form of security for the most valuable transactions (such as e-banking) or assets?' and 'Can we make the 'business' of the attackers less attractive by applying security technologies that are particularly tailored towards destroying the business model of the attackers?'
Olivier

Hospitality Technology - Three Ways the Hospitality Industry Can Reduce Waste | LIFE FO... - 3 views

  • 25 percent of all food passing through kitchens gets thrown out
  • recycling containers are still uncommon in guestrooms
  • leak detection systems are installed in only 21 percent of hotel properties
  • ...9 more annotations...
  • The average person in the U.S. generates more than 4 pounds of waste per day
  • understand where their waste comes from
  • Capturing qualitative and quantitative waste data from waste bills, and the trash itself, enables hotels to build a business case for waste reduction, identify new opportunities for recycling and food waste programs, and target org-wide training programs to maximize diversion
  • Set real benchmarks to achieve goals.
  • identify trends and targets to focus on by geographic region, site function, or department
  • Waste can fluctuate due to the economy, opening or closing locations, and changes in packaging, so measuring tons of waste generated against a specific metric, such as items sold or people served, can be much more effective.
  • Know the local landscape.
  • adjust best practices around local regulations and recycling and composting programs
  • Data is the key to turning a sustainability dream into reality – to thinking strategically about both financial and environmental costs and embracing a holistic approach to waste reduction.
  •  
    Waste management is a real concern nowadays especially in the hospitality industry whcih is facing waste in many different department within their walls. The Dumpster dive for data, the setting of real benchmarks and the understanding of the local landscape are 3 major ways on how an Hotel can reduce their waste.
  •  
    Interesting article. Waste management is a concern. This problem needs a solution, by collecting data will show hotels where the changes need to be made. These are practices that need to be in place to be beneficial for our environment. By placing recycling containers in guests rooms may be beneficial, having them on housekeeping carts could be another avenue to explore. Different solutions will need to be made for all aspects of the hotel. In my opinion, I believe there will be practices in place that will help reduce hotel waste and improve our environment.
pmcclain

Keeping Data Secure While HRIS Implementation - HR Payroll Systems - 0 views

  • A HRIS contains highly sensitive data, including employees’ social security numbers, payroll information, and even medical information. Information leaks and data breaches of the HRIS can be detrimental to individual employees and your organization as a whole. As such, it is important to take steps to make sure that that information is as safe as possible, from both internal and external threats.
  • When you are looking to purchase a new HRIS, look into the reviews and pay close attention to what other companies say about the security of the software.
  • All HRIS vendors take precautions to keep company data safe, but the quality of their security measures may vary.
  • ...3 more annotations...
  • Before the system goes live, create a few fake employees and test the system to see what you can access. This way you can identify any weak points in the system and work out the bugs before giving everyone access to the system.
  • it is important to understand that breaches can still occur. Having a disaster recovery plan in place will minimize the amount of time that your system is down and help to re-secure your data faster. There should be clear procedures in place for responding to a data breach so that the right employees know what to do in the event of a breach.
  • Having a plan in place can make it quicker and easier to recover from a breach, helping to secure information before further damage can be done and resolving issues stemming from the breach.
  •  
    The article discusses how important choosing the right HRIS for a business. Suggestions on how to choose the most effective one based on other company's responses. Educating employees on security protocols, preparing for the worst and implementing a disaster recovery plan.
mfont039

Spookier Than Ghosts: 5 of the Biggest Cyberattacks We Saw in 2019 - 0 views

  •  
    This article remenisces on the biggest data breaches of 2019 where millions of people's social security numbers, financial data, medical records, and private information were exposed. Some of the 2019 data breach were cuased by third party app developers or hackers working alone. The data breach happened with Facebook, Capital One, Canva, Quest Diagnostics and DoorDash
azephyr

Cybersecurity in Hospitality Industry - Types of Threats - Logsign - 0 views

  • implementation of electronic devices and similar conveniences also pose serious threats regarding the security of our sensitive information. That is why cyber security practices gain much more importance in the hospitality industry. I
  • The term cyber security is used to refer to the methods and practices that aim to defend devices, networks, servers, electronic systems and all kinds of data from ill intended attacks.
  • Cyber security professionals aim to keep such malicious intended individuals away from your systems.
  • ...7 more annotations...
  • Cyber security practices often involve the use of a tool or software such as antivirus programs, firewalls, anti malware software and such. In accordance with the needs and vulnerabilities of your organization, various cyber security solutions can be employed and configured. You can opt for getting professional help and/or hiring a team of cyber security professionals for this task.
  • In the past years, we have witnessed many hotels being victims of cyber criminals. Such incidents lead serious data leakages and hurt the reputation of the organization.
  • Customer Data/Identity Theft: When booking a hotel room, we share some of the most sensitive pieces information regarding us: Our name, address, payment information. That is why most hackers try to steal customer information from the hotels using malware, computer viruses and social engineering methods.
  • he term phishing refers to the techniques used to deceive and convince professionals to leak information. The most popular phishing techniques include fake web pages, phone calls, text messages and e-mails.
  • Darkhotel hacking: This technique involves hacking the hotel WiFi and steal information from the visitors.
  • If you want to protect your organization from cyber threats, first you need to inform your employees.
  • Secondly, you must invest in some bullet-proof cyber security software including but not limited to antivirus, antimalware and firewalls. You must also hire a team of IT specialists to ensure that your organization is protected 24/7.
  •  
    This article talks about the type of threats the hospitality industry can face, an explanation of cybersecurity, and how to protect your organization from cyber threats, especially phishing.
andreagordon99

10 Disadvantages & Risks of Cloud Computing | by Sarah Lavinski | FAUN | Medium - 1 views

  • Cloud Computing is a combination of the use of computer technology (computing) and Internet-based development (cloud). Cloud is a metaphor of the internet, as is the cloud that is often depicted in computer network diagrams.
  • data and cloud protection must be good because if it won’t be dangerous for data confidentiality.
  • weakness of public cloud is where everyone accesses the same server and server and will increase the risk of attack, and down the server.
  • ...2 more annotations...
  • Marketplace companies such as Amazon, Alibaba and Airbnb have considered cloud computing risks and benefits.
  • Disadvantages of cloud computing that has less security can cause data leak to public.
  •  
    This article discusses the risks and disadvantages with cloud computing. Some people love using the cloud and they find it the best way to save their information. Others prefer the use of an external hard drive. While there are pros and cons to both companies should not only rely on cloud computing. As you can find in this article there are some definite disadvantages that need to be worked out before this becomes our only tool for saving information.
angelopecorelli

Hilton Was Fined $700K for a Data Breach. Under GDPR It Would Be $420M | Digital Guardian - 0 views

  •  
    This article goes over the multiple lawsuits that Marriot had to face due to a massive cyberattack in 2015 where multiple credit card numbers were leaked. I think this is a perfect example of how cloud computing is not a bulletproof system at the moment and how it still has much room to grow. Similar cyberattacks happen all over the world some on a smaller scale and some on a larger one. I believe this is an article that everyone should read to truly understand the reproductions that a company can face if they don't have a strong cyber defense.
emmajeenie

Attacked by Ransomware, Many Companies Opt to Pay Up - CFO - 1 views

    • emmajeenie
       
      The demanded ransom is often a moderate amount that would pale in comparison to the recovery and reputational costs for a company that refuses to pay.
  • Hospitals, for instance, are frequent targets of these kinds of attacks, in part because people’s lives are on the line so they have to make quick decisions.
  • , in a ransomware attack the data isn’t released or leaked or sold. On the contrary, in most cases, data and infrastructure aren’t compromised at all; its owner just can’t access them.
  • ...11 more annotations...
  • y rose 41% from 2018 to 2019 to more than 205,000 globally, according to newly published data.
  • the security firm Coveware estimates the average payout for those that did was about $85,000 during last year’s fourth quarter, and more than $190,000 in December.
  • its leaders give in — and pay the ransom.
  • Organizations have more to lose financially from the inability to conduct business than they do from just paying the ransom
  • It’s like the plot of a James Bond movie: Hackers take control of a global organization’s computer systems and threaten to destroy its records, steal its intellectual property, and drain its bank accounts unless a hefty ransom is deposited into an untraceable offshore bank account by the end of the day.
  • ” the ransom is likely a significantly smaller amount than what it may cost to address a threatening public issue or the time and money necessary to rebuild the confidence in a brand or company.
  • Experts suspect that the actual number of ransomware attacks is much higher than the reported number, citing reasons ranging from fear of job loss, investor withdrawal, and reputational damage
  • Moreover, while public companies are required to report cyberattacks to regulators, private organizations are under no such mandate. Reporting attacks to law enforcement often may cause lengthy investigations
  • A hacker can keep repeating a ransomware attack until the security flaw is fixed or they are caught or reported.
  • Organizations can undertake a few basic defensive actions to mitigate the impact of a ransomware attack. Frequently backing up data and storing it on different networks is one way,
  • reducing the number of outside apps the system uses, fixing software vulnerabilities immediately, and properly training and educating employees on what to look for and whom to alert if something appears suspicious.
gabybilk

MGM Grand in Las Vegas Implements New Security Policy -- Security Today - 0 views

  • A leaked MGM Grand memo posted by Vital Vegas states that beginning Feb. 4, "All guest elevators at MGM Grand will be modified only to allow access to the floor to which the guest is registered."
  • Our processes and procedures are always evolving as part of our focus on providing the best possible service and keeping guests and employees safe.
  • However, security and safety on the Vegas Strip remains on peoples’ minds following the Oct. 1, 2017 Las Vegas mass shooting, in which a gunman killed 58 people and injured 851.
  • ...1 more annotation...
  • was also an incident in which two tourists were stabbed to death inside of their hotel room at Circus Circus
  •  
    The article discussed MGM Grand new security procedures they are taking with their hotel. They will have their elevators modified to only allow guest access to the floors they are in and not other floors. MGM Grand explained no incident has occurred within the hotel as reasoning behind this but it is expected the hotel is implementing this because of past incidents in Vegas. In Vegas there has been a mass shooting in the last years and tourist have been stabbed to death by a suspect who sneaked in to their room. Due to all of these horrible incidents hotels have begun to enhance their security to ensure guest safety. I think having guest access only the floors they are in is a a good way to keep guest safe. This allows strangers from going to the floors or in to guest rooms and creates more limitation to guest floors.
sabrinajalane

https://www.hotelmanagement.net/tech/10-ways-smart-technology-reshaping-hotel-industry - 0 views

-From operations to guest experience to marketing, smart hotel technology offers a variety of cost savings and revenue opportunities, and it is enabling hotel owners to reach new levels of profitab...

Technology hospitality hotel Tech

started by sabrinajalane on 27 Sep 20 no follow-up yet
yvenisem

The Advantages of Manual or Computerized Accounting | Small Business - Chron.com - 0 views

  • Such information may be analyzed to help business owners make future financial decisions, using the advantages of either manual or computerized accounting.
  • Computerized accounting has the advantage of increased efficiency and time management when compared with manual accounting.
  • Computerized accounting has the advantage of higher accuracy when compared with manual accounting
  • ...19 more annotations...
  • The potential for human error is greater when employees are manually completing accounting procedures.
  • The advantages of manual or computerized accounting systems may be equal when it comes to reliability.
  • Manual accounting can function independently of machines so that work continues when "the system" isn't working.
  • modern backup systems and increased functionality, the disadvantage of reliability in computerized accounting may be lessened.
  • the subtlety and focus of an analysis’ conjecture or hypothesis depends on the person operating the system.
  • manual accounting may have an advantage over computerized accounting systems.
  • computerized accounting systems lose their potential for sophisticated analysis.
  • analysis may be hampered or obstructed by software design.
  • Computerized systems can cost millions of dollars to purchase, implement and maintain. It may be necessary to purchase updated software with some regularity.
  • automatically updated and instantly available.
  • It can be costly to staff qualified accountants to complete manual accounting processes, but it can also be costly to staff accountants familiar with specific computerized accounting software and programming.
  • Computerized systems can produce invoices, purchase orders and other documents more quickly.
  • small business owners who are not tech-savvy may prefer to use physical records instead of software
    • yvenisem
       
      still a dangerous game to play
  • All calculations are performed manually, which eliminates the risk of duplication mistakes and corrupt data
    • yvenisem
       
      didn't consider this
  • Computerized accounting systems are significantly more complex and involve a learning curve
    • yvenisem
       
      can be daunting to learn for many people
  • Additionally, there is no risk of data loss or leaked financial information due to data breaches.
    • yvenisem
       
      good pro
  • Some may require switching to the latest computer technology, leading to higher costs
    • yvenisem
       
      might not be financially feasible for many
  • manual accounting is prone to human error
    • yvenisem
       
      #1 con in my eyes
  • computerized accounting provides companies with financial intelligence
    • yvenisem
       
      so much easier to do everything where you know what the finanical outlook will be like
  •  
    This article compares the advantages and disadvantages of having a computerized accounting system and then also completing the task by hand. When looking at different factors it is clear that it seems like an owner would run a risk going either way because where the computer would lack in areas, the human touch would prevail and then where a human touch would lack in other areas, the computer would prevail. Therefore, I would conclude that it is probably better to have a little bit of both to help make the process smooth but not over bearing on a human or even on the computer.
  •  
    This article basically goes over the pros and cons of switching over to computerized accounting systems like Quickbooks and Freshbooks. It goes over the main concerns like data breached and human error, but it also deleves a little deeper to discuss how many of the software require regular system and hardware updates in order to have the software run efficiently.
jchac014

LG Electronics Partners with Hilton Hotels to Recycle Old TVs - 1 views

  • TVs are the largest contributor to electronic waste, which is one of the fastest-growing waste streams in the world.
  • To address this issue, Hilton Hotels recently teamed with LG Electronics to create a TV recycling pilot program.
  • The need for an e-waste recycling solution is urgent. Not only is the waste prevalent, but it’s also toxic.
  • ...7 more annotations...
  • “Hilton is committed to minimizing waste by providing our properties with a sustainable solution for the proper disposal of their existing TV sets rather than sending them to a landfill where they can leak harmful substances in the environment,” says Judy Pines, director of sustainability and responsible sourcing at Hilton.
  • Working together, Hilton Hotels, LG and GSS recycled nearly 400 older flat-panel hotel TVs from the Hilton Newark Airport.
  • Each recycled TV set was replaced with a new 43-inch Energy Star certified LG flat screen TV. The program was successfully executed in four days and had a minimal impact on guests.  
  • The old TVs were transported to an e-Stewards-certified recycling facility in New York, where they were manually taken apart and sorted into various components. “Parts that cannot be dismantled efficiently are shredded into smaller e-waste pieces and eventually broken down even further,”
  • TVs contain valuable and reusable materials such as plastics, copper, gold and glass and approximately 99 percent of the TV components can be repurposed into new electronics
  • One option is a turnkey solution that includes the installation of new TVs, the removal of old TVs (50 unit minimum), TV programming and transportation to a recycling facility. The second option is for recycling services only and includes the removal of the old TVs and transportation of the old TVs to an e-recycler.
  • In addition to partnering with Hilton Hotels, LG has focused on making responsible recycling a priority.
  •  
    TVs are the largest contributors to electronic waste. Electronic waste recycling solution is urgent because the waste is toxic. LG partnered with Hilton Hotels for a recycling program to efficiently recycle their old TVs without sending them to a landfill or somewhere overseas. Through the program, recycled TVs were replaced with newer 43" Energy Star certified LG flat screen TVs.
Karyn

Green Chemistry – Electronics TakeBack Coalition - 0 views

  •  
    This article discusses a solution to the toxic chemicals that are used in technological products and its effect on the environment due to lack of recycling and toxicity hazards. The current solution to the hazardous chemicals leaking into the environment and its human rights issues has been a management solution only. Products are made with these chemicals without, possibly for decades, knowing the true harm that coming into contact with them can cause to humans and the environment, so scientists simply try to decipher this and contain the problem. This has led to huge amounts of money trying to clean the damage already done by this tech trash. We are now learning (especially with the rejection of trash from poorer nations), that there needs to be a better solution to this problem. The article points out a plan with a few strategies, but which center more around prevention, than cleaning up after a mess. This is where "green chemistry," comes in. Technological products of all kinds can be redesigned with prevention of toxicity in mind. This has to do with not only using less toxic chemicals, but using chemicals that break down in certain ways, testing new methods to see how they break down before using them, designing safer chemicals, using renewable raw material, design for better energy efficiency, and more. The article states that it is important for the electronics industry to take responsibility and to design with green chemistry. Green chemistry is a very new science, brought about by the realization of the overwhelming issue of toxic tech trash. A smattering of universities are now developing these green chemistry programs, or in the least, requiring chemistry students to take courses on toxicity which were not requirements previously.
  •  
    The hospitality industry can contribute to this movement by recycling hardware, reducing hardware usage, and purchasing technology that becomes developed that is considered to be "green." This way, the industry can produce less waste that is driving this huge international problem.
irinadolgopolova

Why It's Crucial to Use Accounting Software Built for Restaurants | QSR magazine - 0 views

  • “Every business uses an accounting system of some sort, and every dollar should end up there,” says Tony Smith, CEO of Restaurant365.
  • a true all-in-one accounting system is more useful for restaurants because it monitors inventory, pays vendors, reconciles bank statements, tracks fixed assets, forecasts scheduling, and produces financial statements.
  • it can be difficult for multi-unit operators using a generic accounting system to see if a certain vendor is billing above the contracted price or pinpoint specific ingredients that might be leaking money due to someone over-portioning a recipe
  • ...2 more annotations...
  • According to Smith, most financial accounting systems focus on monthly or fiscal periods which provide a comprehensive breakdown only at the end of a particular cycle. But in restaurants, where the week is so important and sales for a month which has five Saturdays can be drastically different from a month that only has four Saturdays, it’s much more important to compare data on a weekly basis by using an integrated, restaurant-specific software.
  • By adding technology that provides better visibility and guidance, operators can greatly increase efficiency and tracking in their restaurants
  •  
    The article discusses how accounting systems specially designed for restaurants can better perform activities like monitor inventory, pay vendors, record transactions, do forecasting, and generate statements by integrating all this data in real time for management to use in their decision making. Using generic software that does not fully integrate all the information available can result in a less efficient operation, where employees spend more time performing their tasks, irregularities are missed, and important information is not analyzed. For example, when compiling information for decision making, most systems focus on a monthly or yearly basis for their data breakdown, while accounting software for restaurants should be able to do it on a weekly basis to adapt to thigh margins and nature of the business.
  •  
    The author talks about the importance of having a specific to restaurants accounting system. They also point out the importance of having a system that can send alerts in cases of suspicious activity or expenses not lining up with the inventory. They also say that it is important to have the ability to review reports on a day-to-day or weekly basis.
abroo041

10 ways smart technology is reshaping the hotel industry | Hotel Management - 2 views

  • In many ways, the hospitality industry is leading the charge in the adoption of smart business technology.
  • Smart energy-management systems can reduce hotel energy costs by up to 20 percent and generate some of the fastest payback periods in the industry (between 12-24 months).
  • As we move toward 2020, we can expect to see more hotel properties leveraging a variety of smart tech to reduce operational costs, improve guest experience and exploit new sources of revenue.
  • ...18 more annotations...
  • smart technology will continue to make it possible for hotels to predict and personalize several guest services based on previous visits and aggregated guest data.
  • From operations to guest experience to marketing, smart hotel technology offers a variety of cost savings and revenue opportunities, and it is enabling hotel owners to reach new levels of profitability.
  • One of the main benefits of smart technology is how it aggregates data and makes it actionable.
  • Smart Reserved Parking
  • Smart Roomservice
  • A single leaky toilet can cost as much as $840 per year. Add to that the cost of water damage that occurs until the leak is detected.
  • Not only can guest data be used to help better accommodate guest needs, but in conjunction with occupancy sensors, it can also be used to automate guest interactions throughout their stay, reducing both friction points and labor costs
  • “Big data is great when you can use it to take action—whether that’s tackling a new market segment or adjusting your rate plans to compete against your competitors. However, the biggest concern around big data and the necessary data harboring is the safety around it.
  • Hotels now can use smart sensors and hotel apps to allow guests to reserve parking spots in advance of their visit and to have their space assigned upon arrival.
  • will save hotels the labor cost of manually managing parking inventory and it will give guests a smoother experience
  • By enabling guests to check in remotely through their mobile device, hotel owners can better predict/manage their staffing needs and save considerably on labor costs.
  • offer appropriate upgrades/upsells, and provide them with a more personalized guest experience
  • saving costs from printing environmentally harmful plastic keycards and its eliminating the hassle of managing keycard inventory that is prone to loss and demagnetization.
  • Smart occupancy sensors will also help hotels push menu notifications to smartphones at optimal times when the guests are in their rooms
  • Data opportunities of smart technology offer hotels a more complete picture of their guests than ever before. Hotels that leverage data insight are the ones that will continue to succeed in the face of increased competition from Airbnb
  • A hotel’s online ratings can not only help predict future bookings, but they offer owners valuable insight into how well a property delivered on guest expectations.
  • The successful properties will be the ones that invest in collecting and analyzing it in an actionable fashion.
    • abroo041
       
      This article discusses the different technological advances that are making major impacts in the hospitality industry. Some of the things discussed are very common, such as mobile check-ins, and have already been implemented in most hotels. Some of the advances, however, are recently making their way into hotels worldwide. For instance. smart energy management. This is when older lighting and HVAC systems are replaced with more energy-conscious, electronic-based ones. This not only saves the hotel thousands in the long run, but it also helps to protect the environment and reduces harmful waste.
  •  
    This article includes ten ways smart technology is reshaping the hotel industry. Smart energy management, predictive maintenance, smart guest experience, big data protection, smart reserved parking, remote check in and check out, mobile room keys, smart room service, smart marketing practices, and online reputation management technology are all highlighted in this article.
  • ...2 more comments...
  •  
    This article talks about how smart technology has lead hotels to adopt new trends that have helped reduce costs and improve services. Trends such as smart energy management systems and online reputation management has enhanced operational efficiency and customer experiences. Both customers and businesses have benefitted from IT technology as it improves communication, reservation and guest service systems.
  •  
    This article outlines 10 smart technologies used in the hotel industry to become a "green" hotel. They list and explain smart energy, predictive maintenance, smart guest experiences, big data, smart reserved parking, remote checkin/check out, mobile room keys, smart room service, smart marketing and online reputation.
  •  
    This article is about 10 ways that smart technology can help and reshape the hotel industry that would be beneficial in the long run.
  •  
    This article explains 10 ways of smart technology in the hospitality industry. 1- Smart Energy 2- Predictive Maintenance 3 - Smart Guest Experiences 4 - Big Data and Big Data Protection 5 - Smart Reserved Parking 6 - Remote Check-in/Check-out 7 - Mobile Room Keys 8 - Smart RoomService 9 - Smart Marketing Practices 10 - Online Reputation Management Technology We all know most of these, but Smart reserved parking caught my attention because I've only seen this once where hotels now have smart sensors and hotel apps that allow to reserve parking spots in advance and it reduces labor since there's not really a valet person assigned. It proves guests a smoother experience from the moment they pull in.
isabelladlp

Confidentiality in the Hospitality Industry - 0 views

  • No specific laws govern confidentiality in the hospitality industry, but your contracts and policies should clearly dictate what degree of privacy customers can expect.
  • Hospitality businesses routinely swipe customer credit cards and may gain other sensitive financial data, such as a customer's bank account information.
  • If you inadvertently leak this data, you could be legally liable for your negligence, resulting in costly lawsuits.
  • ...18 more annotations...
  • If your connection isn't password protected, anyone can access the system.
  • And even with a password, computer-savvy network users can gain access to another user's data.
  • Hospitality workers don't have any special legal authority, so they can't physically restrain a customer. Instead, they should call the police if they suspect criminal activity.
  • Your company's confidentiality policy can educate customers about the amount of privacy they can expect.
  • If you promise a customer a specific amount of confidentiality and then break that agreement, you've broken your contract and can be sued.
  • No one can contract to engage in illegal behavior, and if someone is in immediate danger, it's your duty to take steps to protect him.
  • It also establishes guidelines for employees to follow, and a clear policy can even protect you against lawsuits.
  • The U.S. Supreme Court has established that hotel customers have a "reasonable expectation of privacy" in hotel rooms.
  • You can't enter or search a guest's room without her explicit consent, but guests are not entitled to any special privacy
  • As a business owner, you value the privacy of company secrets and procedures, which is why you expect your employees to maintain some standard of confidentiality
  • confidentiality in employment is implicit, regardless of whether employees have signed an agreement.
  • If a member of your staff violates this explicit or implicit agreement, the penalty for breach of confidentiality can be severe and long-lasting.
  • an employee who signs this type of agreement agrees that a violation of confidentiality is also a violation of the employment contract. The penalty for breach of confidentiality isn’t restricted to employees who have signed confidentiality agreements,
  • if you own a computer security company and an employee’s laptop is stolen, and that employee didn’t encrypt sensitive data on that computer per company policy, it could constitute a breach of confidentiality.
  • Healthcare privacy is essential, not only to protect a patient’s right to decide who has access to sensitive information but also to protect doctors and other healthcare professionals from malpractice claims.
  • Theft is a violation of criminal law that in some instances can be punishable by a stiff fine or imprisonment.
  • As a business owner, you would report the theft to law enforcement, and the state or federal government would charge your employee with the crime.
  • Employers will not look favorably on any prospective employees who were terminated due to a confidentiality breach, or convicted of a crime related to that type of violation.
ldevaul

8 Disruptive Hotel Technology Trends to Watch in 2021 - 6 views

  • For those of us keeping an eye on technology in hotels, it can be difficult to discern what trends are here to stay and what trends are simply a marketing stunt.
  • Venture capitalists are finally starting to recognize the opportunity to invest in tools and platforms that allow hotels to capture new levels of hotel operations efficiency and revenue growth.
  • Cloudbeds offers an all-in-one suite of tools, including a property management system, channel manager, booking engine, and revenue manager, growing revenue and automating workflows at more than 20,000 properties.
    • ldevaul
       
      This is definitely something to look into. SaaS programs, nowadays, are super robust and offer so much data and opportunity for large and small businesses.
  • ...29 more annotations...
  • Despite being one of the largest and most dynamic segments of the US and global economy, penetration of cloud-based technologies in the segment remains incredibly low, and the vendor landscape remains tremendously fragmented on a global basis,” says Matt Melymuka, co-founder and partner at PeakSpan Capital.
    • ldevaul
       
      This is very interesting...one of the largest industries and they are the slowest to invest in cloud-based technologies. A lot of companies clearly prefer to print everything and leave an actual paper trail!
  • Life House, a tech-first hotel experience, shows proof-of-concept: that hotels that invest in technology drive higher revenue, better guest reviews, and a higher star-rating.
  • Hotels use Zingle’s messaging tools to deliver five-star service at scale; Medallia’s investment in Zingle gives hotels the opportunity to provide frictionless guest service and streamline time-consuming interactions, such as check-in.
    • ldevaul
       
      I'm sure companies who invested in this program during the height of pandemic were very thankful!
  • Hotels are catching on, adding convenience through streaming, voice activation, guest-room tablets, and food ordering tech.
    • ldevaul
       
      The guest room tablets that can order room service and manage the operating system in the room is a game changer. Hotel Mousai in PV Mexico has this installed in all of their suites and it was super impressive!
  • White labeling is a practice in which a product – in this case, hotel software – is manufactured by a third party and uses branding by the purchaser, or marketer, so that the end product appears to have been produced by the purchaser.
  • An API, application programming interface, is simply a messenger of data between applications. APIs allow your various hotel technology tools and programs to work together, connecting your RMS to a PMS, or your PMS to your upsell software, or your business intelligence software to your PMS. An API makes your technology user-friendly and efficient; when your tools work together, you capture each platform’s full capabilities.
    • ldevaul
       
      This is super useful! When all of your software can speak to each other it improves productivity so much!
  • For instance, feeding data from your PMS into a business intelligence tool leads to real, operational data to analyze trends and provide recommendations for better marketing campaigns, smarter staffing decisions, seasonal trends, and market competition. Hotels that are comfortable using APIs can automate tasks that take up much of their employee’s time with manual data entry.
  • On-demand convenience dominates our lives, and guests expect this level of ease from their hotel experience as well.
  • Oaky, one of the industry’s leading upselling tools, raised a Series A funding round of $9.5 million led by PeakScan Capital. Oaky’s appeal to investors stems from the app’s data-driven approach to driving incremental revenue. Their deep understanding of customer behavior makes Oaky one of the top-rated upselling tools on the market today.
    • ldevaul
       
      This would be great for hotels who are struggling to increase their revenue.
  • Hilton is taking a different approach, partnering with Netflix to allow guests to control their streaming straight from the Hilton Honors mobile app.
    • ldevaul
       
      This is genius! Definitely will be trying this at my next Hilton stay.
  • As far as voice-activation, Volara is leading the way in providing a thoughtful, Alexa-esque guest-room solution. Volara integrates with the most popular work order management systems so that guests can make requests and get confirmation when the item or service they need will be delivered.
  • And for savvy marketing managers, tablets provide a new channel through which to send targeted, automated messages generating $5,000 per month in additional revenue.
    • ldevaul
       
      This is great for hotel marketers! Proving their value and having the company invest in tech that shows an huge ROI. Love this!
  • 2nd Kitchen is a godsend for hotels without a kitchen on-site: guests can order room service from restaurants near your hotel, taking care of care of orders, menus, payment, fulfillment, and customer support for your property.
  • Hotels are a prime target for hackers. “Only about 25% of all U.S. businesses, including hotel operators, are fully compliant with current data security best practices. That means that three out of four are not and are potential disasters waiting to happen,” reported one cybersecurity expert.
    • ldevaul
       
      This is definitely worth exploring more!
  • Numerous high-profile malware attacks on the hotel industry have led to hundreds of millions of guests’ data being compromised and millions of dollars in damage. Just this February, MGM Resorts revealed they were the target of a massive data breach that compromised personal information for more than 10.6 million guests. Files leaked in the MGM attack included information on celebrities, chief executives of technology companies, reporters and government officials, according to Skift.
  • Expedia and Booking have taken some pretty big hits in recent months.
  • Why the dive in stock price? There are two factors outside Coronavirus that are impacting OTAs. First, hotels are getting better at capturing direct bookings. Hotel tech like direct booking platforms, metasearch ad managers, and messaging integrations help properties draw more visitors to their site and convert more direct bookings, circumventing the high OTA commissions in the process.
  • Secondly, Google has entered the travel market in a big way. Google has expanded from traditional AdWords to include hotels everywhere via its Hotel Ads product.
  • 5G may be getting all the buzz, but for property owners, WiFi 6 is much more relevant. WiFi 6 is the term used to describe the next iteration of Wifi, a faster, more efficient connection enabled through new technologies. WiFi 6 is about 30% faster than our current WiFi.
  • With WiFi 6, your property can leverage in-room technology to provide better service, driving positive guest reviews and repeat business. Smart thermostats, smart speakers, and smart locks will all perform better with the adoption of WiFi 6 over the next five years.
  • Investors in Oaky already recognize this next insight: data has become the world’s most valuable resource. The sooner you start to mine guest data for better customer insights, the better positioned your property will be against your competition.
  • Data can fuel smarter marketing campaigns, inform your pricing, and help you capture a higher market share than your competitors by knowing your guests on a deeper level.
  • Earlier this year, Revinate launched the hotel industry's first Guest Data Platform to aggregate, clean and deliver rich guest profiles for hotels and property groups of all sizes. The platform combines data from multiple sources to provide a complete picture of a hotel’s guests, delivering the information needed to increase guest satisfaction scores, direct bookings, and ultimately, profit.
  • Brands in the alternative lodging sector include Stay Alfred, Sonder, The Guild Hotels and to some extent groups such as Selina and OYO. 
  • The biggest distraction or barrier these next-gen hotels face is that they’re taking the wrong approach to tech. The companies that win will be the ones who stop acting like tech companies – using buzzwords like AI and virtual concierge – and focus on being more innovative and agile real estate businesses than traditional market players today. Those that succeed will be tech-enabled businesses; not tech businesses.
  • Smart hotel rooms use technology to allow guests to personalize their stay experiences.
  • Technology is becoming more important to hotel operations because it can deliver increasingly high value for hoteliers and guests.
  • The most important software in the hotel industry is the property management system, which acts as “mission control” for hotel operations. Hoteliers use a PMS to manage reservations, check guests in and out, and handle billing.
  • While exciting technologies present new options for hoteliers to enhance their offerings, these new innovations also mean hoteliers must focus on data security and continued training when implementing the technology that guests expect.
  •  
    This article takes a deep dive into the emerging tech trends in 2021. They briefly touched on how SaaS is slowly taking over the traditional PMS and how venture capitalist can't get enough of these programs. Another honorable mention in this article is the explosion of guest room tech such as streaming services, voice activation, and guest room tablets. OTAs that have traditionally been top dogs when it came to hotel bookings are slowly declining and big data is becoming super insightful to hoteliers. This article touches on so many avenues of tech and it's definitely a must read!
anaferia

The biggest cyber attacks of 2022 | BCS - 0 views

  • In a year of global inflation and massive rises in energy costs, it should come as no surprise that the cost of a data breach has also reached an all-time high.
  • average total cost of $4.5m
  • Amongst the 550 companies that IBM contacted that had experienced a data breach, a disappointing 83% had experienced more than one in the same period
  • ...9 more annotations...
  • common attack vector remains credential theft (19%) then phishing (16%), misconfigured cloud (15%) and vulnerabilities in third-party software (13%).
  • Russia has, for many years, attacked Ukrainian infrastructure such as power grids, internet infrastructure and banks. Since the outbreak of physical hostilities, this has extended to systems related to government administration and the military.
  • The Russia-linked cyber gang known as Conti managed to cause major disruption to financial operations throughout Costa Rica in April.
  • cripple Costa Rica’s import/export business.
  • A group known as Lapsus$ began 2022 with a string of high profile targets including Nvidia, Ubisoft, Samsung and Microsoft. In each case, data was stolen and in many cases leaked online. Their operating model is extortion where access is most often gained through phishing and then they seek out the most sensitive data they can find and steal it. Often, they do not deploy encrypting software at all.
  • Hacking back is where offensive security experts will attempt to compromise attacker’s machines. This can be legally murky as often the attacking machines are compromised third parties.
  • June this year, a former Amazon employee, Paige Thompson, was convicted for her role in the 2019 Capital One breach. While working for Amazon Web Services (AWS), she exploited her knowledge of cloud server vulnerabilities and stole personal information of over 100 million people.
  • Ransomware, while not the overwhelming headline grabber it was a year ago, is still a major and terrifying threat to many companies
  • The main attack vectors continue to be credential theft and phishing emails so it is vital to continue to raise awareness through corporate training and public ad campaigns. Finally, the conflict in Ukraine is showing how effective cyber weapons can be in disrupting command and control in a war.
  •  
    To summarize, this article states that, it should not come as a surprise that the cost of a data breach has also increased to an all-time high in a year marked by significant increases in energy prices and worldwide inflation. According to IBM's Cost of Data Breaches Report 2022, the average overall cost is $4.5 million. Additionally, even if ransomware isn't garnering as much attention as it did a year ago, it still poses a serious danger to many businesses. Credential theft and phishing emails are still the major threat vectors, therefore it's critical to keep spreading awareness through public awareness campaigns and business training. Finally, the situation in Ukraine is demonstrating the potency of cyber weapons in sabotaging command and control in a fight.
‹ Previous 21 - 40 of 41 Next ›
Showing 20 items per page