Skip to main content

Home/ Hospitality Technology/ Group items tagged library

Rss Feed Group items tagged

Ryan Jove

First look: US$58 million guestroom makeover at The Peninsula Hong Kong | CNNGo.com - 0 views

  • The Peninsula Hong Kong launches US$58 million guestroom makeover Grande dame of Asian hospitality moves up to the 21st century with in-room technology and modern aesthetics
  • (US$58 million) refurbishment of its 300 guest rooms with new digital enhancements. The first completed phase was unveiled y
  • . The first completed phase was unveiled y
  • ...3 more annotations...
  • New rooms at The Peninsula Hong Kong will be smothered in digital touches, ranging from touch-screen tablets that control all functions of the room, to a DVD library of 3D movies to be watched on the in-room HD televisions.
  • A touch of a screen can change pre-set room modes, such as switching to a "spa mode," or change languages settings across all platforms in the room. 
  • Long-distance calls from the rooms become free-of-charge as complimentary Wi-Fi allow VOIP calls. 
  •  
    The Peninsula Hong Kong has launched a $58 million dollar renovation to get up to date with their in-room technology.  They have chosen to add touch screen tablets to each room.  These tablets will control all functions of the room.   They have also added a dvd library of 3D movies that you can watch on their new in-room HDTVs.  You can switch room modes at the click of a button.  They have added VOIP calling from the rooms as well.  This is a huge upgrade and they have become relevant in the tech world.
Yichen Yang

Online Reservations Streamline Event Planning for Iconic Hotel - 1 views

  • In order to streamline and simplify event planning for meeting professionals working with their hotel, The Red Lion Hotel on the River - Jantzen Beach has implemented the GroupMAX online reservation system from Passkey.
  • Planners that choose Red Lion Hotel on the River for their event will be equipped with a powerful set of tools that include various templates and themes, libraries, bundles and customized event websites
  • The booking process for each event also includes a dedicated social network, which helps drive attendance and extend the event lifecycle, allowing attendees to connect before, during and after the event. An event-centric social networking option dramatically boosts the perceived value of the event.
  • ...1 more annotation...
  • While guests enjoy the convenience of online booking and networking, meeting planners can track the progress of their events via their own set of online dashboards that provide automated email alerts and other tools helping to mitigate the difficulties of managing room blocks and bookings.
  •  
    According to the article, the Red Lion Hotel on the River - Jantzen Beach has implemented the GroupMAX online reservation system in order to streamline and simplify event planning for meeting professionals. Planners that choose Red Lion Hotel on the River for their event will be equipped with a powerful set of tools that include various templates and themes, libraries, bundles and customized event websites. The booking process for each event also includes a dedicated social network, which helps drive attendance and extend the event lifecycle, allowing attendees to connect before, during and after the event. An event-centric social networking option dramatically boosts the perceived value of the event. While guests enjoy the convenience of online booking and networking, meeting planners can track the progress of their events via their own set of online dashboards that provide automated email alerts and other tools helping to mitigate the difficulties of managing room blocks and bookings.
  •  
    The Red Lion Hotel has implemented the GroupMAX online reservation system to streamline and simplify the event planning. For hosting the events and also using the related facilities, Red Lion has became the convention destination. Now GroupMAX may combine the housing management, communications, booking processes and logistics together and working with the hotel. Red Lion has a lot of powerful tools to guarantee the event. Also, the mobile version of booking website can be accessed from other mobile devices. Booking process for each event is more like a social network. The event will present the value. Meeting planners will track the progress of the events through the dashboards that provide automated email alerts. Those things all make sure the events going smoothly.
Xin Jing

Cendyn Launches eFaceTime Video Sales Capability for eProposal | Products | Hospitality... - 0 views

  •  
    Cendyn and Vipe Inc, a video marketing sofeware provider, launches eFaceTime video sales capability for eProposal. By using this technology, hotels enable to offer personalized videos about their service, food&beverage, function space, amenities and staff to the event planners or customers through eProposal presentations. This technology only need a hand-held cameras to link the videos, can hotels' sales people produce a high quality promotion vedio with less cost. It also provides video libraries, sales people can compare the videos and inser the best one into the sales Proposals quickly. Moreover, the eFaceTime video provide an effective way for the hotels to welcome their patrons. This technology drive the eMarketing to go futher. Its unique personalized videos may help the hotels to attract more customers especially for the event planners.
  •  
    The distance is not a problem anymore. The style of proposal presentations is more is more convenient and less limited.
  •  
    I think this is a useful technology for a hotel because hotel can sale its product without limited by region. In this way hotel can increase its market share and increase the profit.
paige rosenberg

Evaluating Web Content - 0 views

  •  
    It's sometime hard to tell which information you find on the Internet to be reliable or not. With all these social media websites,blogs, newsstands Wikipedia etc,people can pretty much post whatever they want for the public to see! To figure out what info in validated or not we need to check the author and they will state where the information is coming from and how much information is stated in the article, also by the content, how professional the website looks and if it is being maintained on the regular. People that post on websites like Wikipedia may not alway be 100% validated, anyone that goes on the website is allowed to make changes an add whatever information they want. If the website shows the authors name, googoling his name will show information about him or her to be able to tell if they post falsified information or not. There is lots of different ways to tell which information we research or not is true , we just have to research on the research we find!!
anonymous

Getting Started with Chrome extension - Diigo help - 1 views

  • Use the “Save” option to bookmark a page. Bookmarking saves a link to the page in your online Diigo library, allowing you to easily access it later.
  • Highlighting can also be accomplished from the context pop-up. After the Chrome extension is installed, whenever you select text on a webpage, the context pop-up will appear, allowing you to accomplish text-related annotation. Highlight Pop-up Menu – After you highlight some text, position your mouse cursor over it and the highlight pop-up menu will appear. The highlight pop-up menu allows you to add notes to, share, or delete the highlight.
  • Sticky Note Click the middle icon on the annotation toolbar to add a sticky note to the page. With a sticky note, you can write your thoughts anywhere on a web page.
  • ...3 more annotations...
  • Use the “Save” option to bookmark a page. Bookmarking saves a link to the page in your online Diigo library, allowing you to easily access it later.
  • Highlighting can also be accomplished from the context pop-up. After the Chrome extension is installed, whenever you select text on a webpage, the context pop-up will appear, allowing you to accomplish text-related annotation. Highlight Pop-up Menu – After you highlight some text, position your mouse cursor over it and the highlight pop-up menu will appear. The highlight pop-up menu allows you to add notes to, share, or delete the highlight.
  • Sticky Note Click the middle icon on the annotation toolbar to add a sticky note to the page. With a sticky note, you can write your thoughts anywhere on a web page.
agrie013

Hospitality Upgrade | Online Skimming Threatens Hospitality E-Commerce Sites - 0 views

  • Attacks against the hospitality industry to gain payment information continue. There is a growing threat to all e-commerce websites called Web-based or Online Skimming. These attacks infect e-commerce websites with malicious code, known as sniffers or JavaScript (JS) sniffers and are very difficult to detect. Once a website is infected, payment card information is “skimmed” during a transaction without the merchant or consumer being aware that the information has been compromised.
  • Today two industry cybersecurity organizations, PCI Security Standards Council (PCI SSC) and the Retail and Hospitality ISAC, joined forces to highlight this growing threat.
  • By exploiting vulnerable plugins, brute force login attempts (credential stuffing), phishing and other social engineering techniques, the hackers attempt to gain access and inject malicious code.  “These attacks are either directly into e-commerce websites or often into a third-party’s software libraries that merchants rely upon.  These service providers may not be aware of the risk they create for their customers if they are not focused on security and the potential threats targeting them
  • ...1 more annotation...
  • The ability to detect these threats before they can cause damage is significantly important. Examples of PCI DSS Requirements providing ”detection” controls include: Reviewing code in order to identify potential coding vulnerabilities (Req. 6) Use of vulnerability security assessment tools to test web applications for vulnerabilities (Req. 6) Audit logging and reviewing logs and security events for all system components to identify anomalies or suspicious activity (Req. 10) Use of file-integrity monitoring or change-detection software (Req. 11) Performing internal and external network vulnerability scans (Req. 11) Performing period penetration testing to identify security weaknesses (Req. 11) Alerting on posts to newly observed domains in proxy logs can further provide additional avenues of detection for future phishing attacks as well as the initial reconnaissance phases of an attack on a thirdparty JavaScript library. 
  •  
    This article goes in to detail that attackers have targeted information that is acquired on websites such as credit card and other personal information. This writing does tell how PCI and Retail and Hospitality ISAC joined forces to help prevent such attacks from happening on these websites. Now PCI and ISAC are the standard when it comes to protecting information. These attacks are easily undetectable by these websites because they are only skimming for the information. this article does give tips for prevention and detection. PCI is the industry standard and by them teaming with ISAC it will make these websites and your information more safe.
snesbeth

How The Internet Has Changed Investing - 0 views

  • most revolutionary and disruptive technologies in history, creating a major paradigm shift.
  • wide availability of information is perhaps the biggest benefit that the Internet has had on investing.
  • contact a company directly for the latest financial report, which could prove costly in terms of postage for large financial reports,
  • ...5 more annotations...
  • With the Internet, an investor can find an online company report from the Securities and Exchange Commission (SEC) website immediately after it is posted.
  • These days, many free websites provide financial information while others charge nominal annual fees for more specialized data.
  • primary benefit that the Internet has had on investing is the affect it has on lowering fees for investors.
  • Internet has placed considerable power in the hands of individuals, and this has had a profound effect on how the investor obtains financial information.
  • lowered costs significantly for most financial market participants.
  •  
    The article basically discusses the differences between investing before and investing now since the internet has been born. Previously, people had to try and gather as much information about the company they were interested in investing in by going to the library and reading as much as possible but now it is easier for investors to search a company up and gain all the information they need and more to invest in that company just by entering keywords. Therefore, the internet has changed the investing game completely and even lowered the amount in fees that brokers pay immensely.
mtedd003

Cyber Security Marketing Tactics That Actually Work - 0 views

  • Whether you want to attribute it to the rise of interconnected devices in the IoT revolution or just the growing instances of cybercrime, the cyber security industry has seen immense growth in recent years and shows no signs of stopping.
  • This should come as no surprise given that the average annual cost of cyberattacks worldwide is about $9.5 million, according to Ponemon Institute.
  • clearly a need for effective cyber security products and services, there are also many solutions on the market, making it more difficult to capture the attention of your target audience.
  • ...22 more annotations...
  • New cyber security companies are popping up all the time in response to the heightened demand. This can make it hard to stand out in the crowd, and it makes it essential for you to communicate what makes your brand different.
  • you also want to be credible.
  • your potential customers need a significant amount of education to understand what threats they face and what solutions they may need.
  • This is especially true given that CEOs and other C-level executives are not as well versed in information security, which can impact a company’s decision to include cyber security as part of their overall preparedness plan.
  • Though there is plenty of evidence pointing to the necessity of cyber security in protecting valuable data, the truth is that many businesses just don’t prioritize cyber security until it is too late.
  • only one in five, or 22% of those surveyed said that they fully incorporate information security into their strategy and planning.
  • data suggests that cyber security marketers must find ways to create a sense of urgency for potential customers
  • Content marketing can help you build credibility while addressing the major challenge of educating your prospects. In order for your content to be effective,
  • ensure that it is unique.
  • Use data in your messaging. 
  • Offering downloadable content like e-books and whitepapers is also an excellent way to convert your site traffic into leads that you can later nurture.
  • Another aspect of downloadable content that you’ll need to consider is the landing page.
  • case studies are one of the most important tactics for B2B companies.
  • Email Marketing
  • Downloadable content like e-books, case studies, and reports that provide readers with a more in-depth understanding of important cyber security topics. Links to your most recent blog posts talking about recent attacks or security concerns and those that break down complex cyber security topics for a wider reading audience. Video content that emphasizes the importance of cyber security and communicates the value of your company’s offering. A digest of relevant articles from reputable industry publications that helps readers better understand hot topics in cyber security. Monthly offers and sales promotions like a free trail, which can encourage prospects to sign up.
  • Webinars are a great way for cyber security marketers to connect with bottom-of-the-funnel leads.
  • interactive element.
  • Webinars can sometimes be costly to produce. However, as with other parts of your marketing campaign, there is also an opportunity to repurpose your webinar to get more out of this content.
  • Paid campaigns are great at accomplishing two goals – amplifying your content marketing efforts and getting prospects to arrive at your demo request landing page.
  • Don’t exaggerate your solution’s results.
  • Blogs are great for attracting prospects in every stage of the buyer’s journey. Try to create some evergreen blog content that will be universally relevant
  • Create an easy-to-navigate library of premium content. 
  •  
    The Cyber-security Market report has predicted worldwide spending on cyber-security will surpass $1 trillion by 2021. This is a result of annual cyber-attacks costing $9.5 million in global damages. The many solutions on the market require cyber-security services to be innovative on how they market. Cyber security companies want to stand out to customers while still remaining credible. Many businesses are also uneducated and/or don't prioritize cyber-security. The use of blogs and downloadable e-books allow marketers to educate while promoting their product. Cyber security marketers have to make sure they have an easy user-interface, use data in messaging, and don't over exaggerate the capabilities of their products.
Manali Rabari

Online Reservations Streamline Event Planning for Iconic Hotel | News | Hospitality Mag... - 0 views

  • The deployment of GroupMAX optimizes event housing management, communications, booking processes and logistics for planners working with The Red Lion Hotel on the River – activities that would otherwise be extremely manual in nature and complex.
  • equipped with a powerful set of tools that include various templates and themes, libraries, bundles and customized event websites, where guests can make reservations and manage their bookings online.
  • The booking process for each event also includes a dedicated social network, which helps drive attendance and extend the event lifecycle, allowing attendees to connect before, during and after the event. An event-centric social networking option dramatically boosts the perceived value of the event.
  •  
    By using an online reservation system to streamline the Red Lion Hotel's event planning needs they have created an online booking and networking system for meeting planners. This system allows them to track their events and managing booking dates/times to avoiding double booking. Planners will have access to online reservations, network of contacts, and tools to set up their events. There is also a mobile component to make reservations that can be accessible from any smartphone at anytime.
Xiaoqing Zhang

High-tech hotels a hit with geeky guests - CNN.com - 0 views

  • Technology is increasingly becoming a brand differentiator for hotels and chains which want to identify with a certain market,"
  • The type of guest drawn to technology and smart design is an attractive demographic to target,
  • at the Andaz hotels, guests are greeted by a host bearing an iPad, which they can use to check in over a glass of wine in the lobby.
  • ...3 more annotations...
  • Hotels such as the Las Vegas Aria at CityCenter provide RFID (radio frequency identification) keys that unlock the room door when flashed over a sensor.
  • London's Ecclestone Square Hotel -- as well as featuring in-wall docking and charging points for guest's devices -- provides visitors with an in-room iPod2 to play with, and a library of 3D Blu-rays (and accompanying 3D eyewear) to watch on the room's 46-inch television.
  • Doggrell says that many larger hotel groups, such as Starwood Hotels and Resorts, are increasingly investing in apps for the mobile market, which allow users to find nearby hotels and check their room rates
  •  
    High-tech can really make life easy.
Tamara Lang

Hotel & Hospitality Maintenance Management Software | CMMS Software Blog - 0 views

  • Preventative maintenance schedules – your library or ours. At Hippo we understand that the proper care of facilities can make a difference in the success or failure of your hotel. Maintaining the optimal working condition of all assets by creating weekly, monthly and yearly preventative maintenance schedules will reduce your hotel’s costs and liabilities
  • HippoFM’s central database for incoming work requests enables you to assign, prioritize and determine what, when and where work needs to be done.
  •  
    HippoFM is a facility maintenance software program that provides preventative maintenance schedules, work orders, CAD graphics, capital planning features, and handheld mobile devices to help ensure hotels provide timely service to guests and provide tools to make the maintenance department more effective. The article states that this system can reduce maintenance costs, increase work-order closing speed and use handheld devices to access the system where ever you go. For any large hotel or restaurant chain I believe that a maintenance management software system is important. The company I worked for ran many restaurants in several hotels and when we implemented this type of system it made tracking and fixing equipment a breeze and managers became less disgusted with the maintenance department.
  •  
    This is a great program for a hotel to have. It seems great that there are hand held devices for the maintenance people to have while they are walking around the property. I also like that it sets up a maintenance schedule for you so you do not have to worry about it yourself.
Laura Montoya

Article: Genting develops software for hospitality industry (507). | AccessMyLibrary - ... - 1 views

  • unique in that it will be customised to meet the needs of modern travellers and can be re-packaged for use in other resorts globally
  • that it will be customised to meet the needs of modern travellers and can be re-packaged for use in other resorts globally
  • Its new subsidiary, Genting Information Enterprise Sdn Bhd, has developed the management system called the Genting hospitality property management system
  • ...2 more annotations...
  • The system is considered unique in that it will be customised to meet the needs of modern travellers and can be re-packaged for use in other resorts globally and ultimately
    • Laura Montoya
       
      It is fascinating how almost everything is done online now a days.
  •  
    I found this article to be extremely interesting. It is from 1999, and is discussing the Genting hospitality management system. Having worked at hotels I know and understand the importance of having a property management system. The article states, "Genting is the first company to have developed a hospitality software in the country." The property management system can be incorporated into many different aspects of the hospitality industry: resorts, gaming, theme parks etc. Genting's managing director described the system explaining that that the software "customized to meet the needs of modern travelers". By using this PMS, hotels would be able to improve their customer service, meet the needs of modern travelers, and schedule maintenance more effectively. Not only will this PMS assist with better catering to the guests, but it will also provide a new source of revenue for Genting as they can sell the system worldwide. The article continues to discuss the amount of internet users being able to surpass the one million mark. It is difficult for me to remember a time when there was no internet as almost everything can be done online now. PMS play a very important role in the hospitality industry, especially when it comes to hotels. They assist with keeping track of how many guests are in the property, the names of the guests, their arrival and departure dates, special requests and much more. Genting paved the way for all the PMS in the industry today.
Irine Wallace

University Library: How to drive revenue through property-management systems - 1 views

  • "We don't get incremental revenue from using the PMS, but there is information in there you can use if you want to," said Graham Dungey, SVP of ecommerce, revenue and distribution for Concorde Hotels & Resorts. "The theory is fantastic. You identify the people who spend the most money and where they spend it. Some hotels are quite forward-thinking; they'll make a study of the minibar, see who is buying what items, put corner-store food into a dozen minibars and sell it for twice as much. There is so much opportunity inside the PMS to increase incremental spend on property.
  • "We don't get incremental revenue from using the PMS, but there is information in there you can use if you want to," said Graham Dungey, SVP of ecommerce, revenue and distribution for Concorde Hotels & Resorts. "The theory is fantastic. You identify the people who spend the most money and where they spend it. Some hotels are quite forward-thinking; they'll make a study of the minibar, see who is buying what items, put corner-store food into a dozen minibars and sell it for twice as much. There is so much opportunity inside the PMS to increase incremental spend on property.
  • "We don't get incremental revenue from using the PMS, but there is information in there you can use if you want to," said Graham Dungey, SVP of ecommerce, revenue and distribution for Concorde Hotels & Resorts. "The theory is fantastic. You identify the people who spend the most money and where they spend it. Some hotels are quite forward-thinking; they'll make a study of the minibar, see who is buying what items, put corner-store food into a dozen minibars and sell it for twice as much. There is so much opportunity inside the PMS to increase incremental spend on property.
  •  
    Use of property management system PMS cost money in terms of upfront investment or maintenance or fees for using a vendor's system but the money generated by the use of the system outweighed the costs. Hotel rooms are perishable and any empty room means waste of resource and therefore using PMS to fill up as many rooms as possible is wise. Likewise empty restaurant costs the owner money to cover the fixed cost including the minimum labor to keep it open.
Nicole Beveridge

Hotels Are Going High-Tech. Is That Good? - TIME - 2 views

  •  
    Technology is part of today's culture. It is almost impossible therefore, to imagine a hotel without some level of technology. If nothing else, even the smallest hotel is likely to have a property management system. Technology increases the efficiency of the staff and enhances the experience of the guest. Technology can be overdone. Cost plays a role in technology, as it does with every management decision. The relative price of technology has been in a downward spiral for many years, however, new products come come onto the market at high initial cost.
  • ...1 more comment...
  •  
    Hi Nicole, Great article! I think that some technology has definitely eliminated some jobs for humans because we used to not have internet at the click of a button and you had to call the operator or go to a library and find the information but now that we have it in our hands at all times who needs people to help us get answers, we just look it all up online. Technology is a positive thing in our lives but sometimes it may be a little too overdone like you said.
  •  
    Great example of too much of a good thing can be bad. Technology can be a wonderful things, making our lives more effecient and accommodating, however as human we yearn for interaction. Specially in the hotels and restaurants, one the the greatest things I remember as kid was being checked it at a hotel. I felt grand; important that someone knew my name and welcomed me. With today's technology, that is a rare exisitance. I check myself in, swipe my phone to acess my room, order room service from my TV and check out withour ever interacting with a human, lets just say I would prefer the brass keys and red tassels.
  •  
    Excellent Article...the growth of technological advances in the industry has become very important for the industry. The Food & Wine maganize reports that besides iPod stations, flat TVs and other commonly known electronics; hotels are adding moonpads that allow guest to set-up room privacy settings, book spa treatments, set-up lighting mood and many more...http://travelkit.nbcnews.com/_news/2012/05/07/11411992-high-tech-hotels-add-ease-and-luxury?lite
Chengcheng Feng

Global Distribution Systems in Present Times - Four Major GDS Systems; Amadeus, Galileo... - 1 views

  • Among the “shelves” on which buyers search for travel services are world’s global distribution systems and the Internet distribution systems
  • The airlines realized that by automating the reservation process for travel agents, they could make the travel agents more productive and essentially turn into an extension of the airline’s sales force. It is these original, legacy GDSs that today provide the backbone to the Internet travel distribution system
  •  
    October 2002 - The travel marketplace is a global arena where millions of buyers (travel agents and the public) and sellers (hotels, airlines, car rental companies, etc.) work together to exchange travel services. This is a good article talking about four major GDS System companies in the world nowadays. When we do some research in GDS area, it is better for us to know some information about these four companies. They are Amadeus, Galileo, Sabre and Worldspan. The author said that Aadeus is Number 1 inlocations worldwide compared to other three companies, Galileo International is a cautions follower when it comes to technology when compared to other GDS companies. Sabre's competitive strenghs are market position, global reach, stable product line, diversification of revenue streams and intellectual capital. And Worldspan has successfully developed the strategies and solutions to ensure the company's long-tern success. After read this article, I think I have the big picture of what GDS System is. The author gave us the strength of different systems. I know what are these GDS companies doing right now in the world. And what is the best is that the author used some accurate data to support the point. So in my point of view, I don't only understand the knowledge related to GDS System, but also learn the way to write my paper, that is using lots of numbers.
  • ...9 more comments...
  •  
    I don't know why but I was failed to highlight this article. I did it in My Library.
  •  
    It is a great article that provides some detailed information on the four most famous GDS. and it was separated into four parts by explaining the four major GDS one by one. It is talking about the history, current status and development of these four major systems to help readers understand what exactly it is and how it works. I like this because it helps me create an overview of GDS systems.
  •  
    Interesting article that summarize important information about major GDS companies. GDS companies such as Amadus, Galileo and Sabre are platforms in which a range of travel related services are offered through electronic switches and routers .
  •  
    This article introduces four major GDS systems' characteristics and strength. I think these information will be useful for hotels when they choose the GDS systems.
  •  
    According to the World's Leading CRS/GDS System 2011, Sabre is the winner profile. And the Amadeus, Galileo, Worldspan and Zurich Systems were nominated.
  •  
    This is about GDS!
  •  
    In the travel marketplace it is global where buyers and sellers work together to exchange travel services. Global distribution systems and the internet distribution systems have become electronic supermarkets linking buyers to sellers and allowing reservations to be made quick and easy. Travel today is sold most on the internet, it is a vast networks of suppliers and a wide customer pool in a centralized maket. Currently today there are 4 major GDS and they are continuing to grow. This article pretty much summed up what we learned in the past 2 classes
  •  
    SUMMARY A global distribution system (GDS) represents a computerized system used for managing different transactions within the air travel and hospitality industry There are currently four major GDS systems: 1. Amadeus (2) Galileo (3) Sabre (4) Worldspan Amadeus Founded in 1987 by Air France, Iberia, Lufthansa, and SAS, Amadeus is the youngest of the four GDS companies. Amadeus is a leading global distribution system and technology provider serving the marketing, sales, and distribution needs of the world's travel and tourism industries. Its comprehensive data network and database, among the largest of their kind in Europe, serve more than 57,000 travel agency locations and more than 10,500 airline sales offices in some 200 markets worldwide... Galileo International Galileo International was founded in 1993 by 11 major North American and European airlines: Aer Lingus, Air Canada, Alitalia, Austrian Airlines, British Airways, KLM Royal Dutch Airlines, Olympic Airlines, Swissair, TAP Air Portugal, United Airlines, and US Airways. It is a major player in the GDS business throughout the world: North America, Europe, the Middle East, Africa, and the Asia/Pacific region. Galileo International is a diversified, global technology leader. Sabre For more than 40 years, Sabre has been developing innovations and transforming the business of travel. From the original Sabre computer reservations system in the 1960s, to advanced airline yield management systems in the 1980s, to leading travel web sites today, Sabre technology has traveled through time, around the world, and has touched all points of the travel industry. Worldspan Founded February 7, 1990, Worldspan was originally owned by affiliates of Delta Air Lines, Inc., Northwest Airlines, and Trans World Airlines, Inc. It is currently owned by affiliates of Delta Air Lines, Inc. (40%), Northwest Airlines (34%), and American Airlines, Inc. (26%). Since its 1995 advance into the world of Internet technology fo
  •  
    This article is about the GDS system, and it introduced four major GDS system in present times. GDS is a worldwide computerized reservarion network used as a single point of access for reserving airline sears, hotel rooms, rental cars, and other travel related items by travel agents, online reservation sites, and large corporations. The for major GDS systems, Amadeus, Galileo, Sabre, and Worldspan owned and operated as joint ventures by major airlines, car rental comopanies, and hotel groups. GDS is also called automated reservation system (ARS) or computerized reservation system (CRS). Among the four major GDS systems, Amadeus is the youngest one and has done remarkably well during its short tenure. With its strong company infrastructure worldwide, impressive product set, and growing customer base, Amadeus is one of the most significant players in shaping the future of the GDS. Galileo's competitive strengths include market share, well-balanced and global presence, relationships with diverse groups of travel vendors, technologically advanced information systems, highly skilled personnel, and a stable product line. Gralileo is a follower when it comes to technology, but is has established successful relationships with entities such as Go, UK's best low-cost airline. Sabre's competitive strengths include market position, global reach, stable product line, diversification of revenue streams, and intellectual capital. Sabre business model is a strong one, and continues to make significant progress in advancing both its electronic travel distribution and its information technology solutions businesses. The last one Worldspan has a legacy of industry firsts that are not well known. It continues to look at benefits of creating its own consumer brand and has been partnering with different companies to expand the services that it can provide to its customer base.
  •  
    GDS is started on the airline industry. And with it development, the airline company recognized that the GDS is becoming more and more important and necessary. And in my opinion, the GDS can not only focus on the airline. It can be on the internet. That is means they should built some sub-company around the world and it will help to form a kind of net that can cover all over the world. So that it is reduce the pressure of airline and increase the short distance distribution. it will be more efficiency for the guest and less human labor.
  •  
    More and more customers rely on global distribution system to buy hospitality products in present time. This article introduces four major type global distribution systems, Ama dues, Galileo, Sabre and Worldspan. There are also some smaller GDS existed in the world. Amadeus is the youngest of the four GDS companies. Galileo International is a diversified, global technology leader. Galileo's competitive strengths include well-balanced and global presence, relationships with diverse groups of travel vendors, technologically advanced information systems and a stable product line. Sabre's competitive strengths include market position, global reach, stable product line, diversification of revenue streams, and intellectual capital. Worldspan provides worldwide electronic distribution of travel information, Internet products and connectivity, and e-commerce capabilities for travel agencies, travel service providers, and corporations.
anonymous

My Library - 0 views

shared by anonymous on 28 Aug 15 - No Cached
  • It may be an overstatement to say that relationships are everything, but not a huge one. The people we spend time with largely determine the opportunities that are available to us. As venture capitalist and entrepreneur Rich Stromback told me in a series of interviews, “Opportunities do not float like clouds in the sky. They are attached to people.”
  •  
    A restaurant was running a business smoothly until the new owner had decided to change the POS system to a new one. The whole system stopped working because of the power. After long two weeks they had finally realized that it simply can not function without the power protection... The owner says that the experience was priceless.
danalbert

Keep Our Wilderness Off Of Wi-Fi - The Daily Beast - 0 views

  • Call it LANifest destiny: the sense the Internet should be available, everywhere, from sea to shining sea. The same illness is starting to infect national parks. Last year, the National Park Hospitality Association petitioned the National Park Service, asking it to make parks more smartphone-friendly.
  • Meanwhile, in the spirit of the Wilderness Act, cities could take easy steps to provide a short respite from all that connectivity. Withholding Wi-Fi is easy. Jammers that block cellphone signals are cheap, simple, and effective over short distances. Physical parks could offer outdoor areas where your phone won’t work, and where your computer can’t pick up any kind of Wi-Fi signal. There could also be wireless-free areas of libraries, coffee shops, public squares, and office buildings.
  •  
    This is actually an article touting the benefits of "unplugging" from our 24/7 wired world. The National Park System is notorious for its horrible cell and WiFi coverage. However, with the exception of its use as a safety net, I concur with the author's points. We visit wide open spaces as an escape from the hustle and bustle of our daily lives. Our smartphones still function quite well as cameras even without a signal. At the end of a day of hiking, when we return to our hotels or homes, our phones automatically upload and archive our adventures. In contrast to the rental car, airline and hotel end of our industry, the escapist mindset that we go into vacations with, may actually benefit from a lack of networks in some cases. A visit to a high-end resort (a la Club Med) many times comes with the "benefit" of no phone or TV in the room. If you're going on vacation, then BE on vacation. Use the technology to archive and share the fun, but don't let it interrupt an unforgettable experience.
lazarobenitez

Hotel Ecommerce Could Get a Boost from Data and Analytics - 0 views

  •  
    This formidable article talks about the information hoteliers should use in order to drive more demand towards their business. The article also give an overview on the different OTAs that accumulate important data regarding clients consuming habits.
msbode

Ensuring Software Integrity in IoT Devices - 3 views

  • oT is defined as the Internet of Things. The Internet of Things refers to the ever-growing network of physical objects that feature an IP address for internet connectivity, and the communication that occurs between these objects and other Internet-enabled devices and systems
  • Gartner predicts that there will be 20.4 billion connected Internet of Things (IoT) devices by 2020, with 5.5 million new things getting connected every day
  • more than half of major new business processes and systems will include an IoT component by 2020
  • ...9 more annotations...
  • Manufacturers are rushing products to market with little or no thought to security, often including hardcoded passwords or known vulnerable software libraries. While this problem is most obvious in the consumer space (which gets the most news coverage), vulnerable IoT devices are present in every business sector as well
  • The TPM stores secret keys, passwords, and digital certificates in its secure internal storage protecting them from software and physical attacks. The TPM acts as a root of trust for checking platform integrity at boot time (i.e., check against any malicious change). A cryptographic hash value of the platform configuration is calculated and compared against the precomputed hash value of the platform. Access to the platform is denied if the integrity check fails [4]. This is the beginning of the “chain-of-trust” for software modules that are subsequently initiated. This transitive trust mechanism is one of the important security features in trust computing. It uses the trust root as a starting point to establish a chain of trust model, in the order of trust root, boot loader, OS, and Application.
  • Secure boot provides the foundation for Trusted Boot, which extends the trust boundary to the boot process and eventually the operating system.
  • software attestation attempts to achieve a dynamic root of trust without specific hardware support. This method has the advantage of not requiring any stored secrets (cryptographic keys or passwords) and allows applications or modules to be updated, which may not be possible if hash values are stored in immutable formats, such as a TPM chip
  • While Secure Boot validates the platform and firmware, Trusted Boot is generally defined as verifying each software module before execution and extending the chain-of-trust to the entire operating system. During the boot sequence, the digest of each executing program is recorded before it executes. A TPM (Trusted Platform Module) is used to store all these records and then report on them securely.
  • It is important to note that Trusted Boot requires a TPM chip so the operating system can see the chain of execution, thus it may not be an option for some IoT devices. Lack of trusted boot support would allow an attacker with physical access, or using a software vulnerability during run time, to potentially modify the stored code and compromise the device.
  • There are many other attack possibilities to consider with IoT devices. For example, existing TPM architectures do not support runtime integrity checking and this allows attackers to exploit vulnerabilities to modify the program after it has been verified (at time of check or TOC) but before the time of its use (at time of use or TOU) to trigger unintended program behavior, such as the execution of malicious code or the leaking of sensitive data
  • Physical attack is a viable method of compromising the integrity of a device. Modifying and replacing firmware by an attacker may be worth the effort, depending on the perceived value of the device or the data it may access (such as a video camera or ATM). Attackers can go as far as removing memory and reading its contents.
  • a device built today can become a major problem tomorrow
  •  
    The purpose of this article was to review the available literature on the subject of ensuring software integrity for IoT (Internet of Things) devices, focusing on detecting and preventing modification of the original software, so that the device cannot be used for unintended purposes. The literature reviewed; secure boot, trusted boot and runtime security. Concluding that no one single control is going to adequately protect a device the solution based upon 25 years of experience is to create a multi-layered approach to security that starts at the beginning when power is applied, establishes a trusted computing baseline, and anchors that trust in something immutable that cannot be tampered with. Additionally, because a device built today can become a major problem tomorrow, due to them having hardcore keys "set and forget", the internet will then have literally billions of obsolete hosts in the coming years. Therefore it is important for MIS Managers/ Consultants investigate how to change the game in order to mitigate the damage or economic value of new systems being breached and by asking questions such as 'Can we even in the presence of a malicious attacker offer some limited form of security for the most valuable transactions (such as e-banking) or assets?' and 'Can we make the 'business' of the attackers less attractive by applying security technologies that are particularly tailored towards destroying the business model of the attackers?'
anonymous

Telecommunications Equipment for the Hospitality Industry - 3 views

  • In an ever more global society, many businesses are becoming progressively more dependent on telecommunications equipment. For the hospitality industry, this is an increasingly vital priority
  • Purchase hospitality telecommunications equipment that meets your needs and is easy to use Before purchasing your in-room telecommunications equipment
  • Use the proper lodging telecommunications equipment to provide for a wide range of Internet demands Some guests may only wish to stay connected with friends and family via email. Others may have a job dependent on reliable and data rich communications with their home base.
  • ...2 more annotations...
  • Choose a hotel telecommunications equipment supplier offering a secure and reliable messaging system A good hospitality messaging system covers a wide range of services to guests, such as voicemail, wake up calls, and general information messages
  • Determining appropriate telecom equipment for the hotel industry is becoming more and more complex. There are many companies focused on providing telecommunications equipment for the hospitality industry, however you must first determine the best equipment to fit your needs.
  •  
    The article describes about the importance of telecommunication in the hotel industry. It also mentions the importance of choosing the right equipment, so the guest is connected to their friends and family. It also provide us an information that it is necessary to have an appropriate vendor so there is no problem once the equipment is installed in the properties. The equipment should also provide a wide range of network which would support all of its guest staying in the hotel.
  •  
    Telecommunication has become the forefront in the hospitality industry, and it is a increasingly a vital priority for customers. Whether guests travel for business or pleasure, they always want to stay connected to their family and friends. In order for the hotel industry to choose the right telecom equipment that will fit the customers needs but also the hotels needs, they need to the following; effective and user-friendly telecom equipment, reliable and secure messaging software, and ample but dependable internet access. Hotel guests want the ability to feel right at home or right and their workplace when they are staying on hotel property, so having the best equipment available to a guest not only in their hotel room but also in other areas, such as library, conference room, pool area, restaurant, or even a bar. The guest wants to feel like they are handling their work business with no software or network interruptions, no matter what area in the hotel they decide to work from. With technology being such a top priority in the hospitality industry or any industry for that matter, ensuring customer satisfaction and repeated business, will anticipate a clients needs.Most importantly, before purchasing your in-room telecommunications equipment, it's best to have a good idea of your current and future telecommunication needs. Telecom equipment for the hospitality industry includes a variety of options. The most cost-effective approach is to acquire equipment with only the options you need or foresee a forthcoming need for.
  •  
    Telecommunication is becoming more important in hotels in general. Choosing all the right equipment and stuff is great but if you dont have a great network to run all this equipment to allow your guess to telecommute. This will allow meeting planner to coordinate events for those not able to travel to meeting and still get the necessary information from the conference there colleagues are attending. It be very interesting to see where this will go.
1 - 20 of 39 Next ›
Showing 20 items per page