Skip to main content

Home/ Hospitality Technology/ Group items tagged physical

Rss Feed Group items tagged

yongwei hao

Physical Plant Engineer Salary | eHow.com - 0 views

  • Physical plant or mechanical plant engineers can be found in almost every business sector and industry and are responsible for maintaining large facilities. These individuals usually monitor their facility's heating, cooling and ventilation systems.
  • Additionally, physical plant engineers must also service and repair their facility's plumbing and lighting.
  • Physical plant engineers are paid an average salary of at least $50,000 to make sure a plant's systems run safely.
  •  
    Physical plant or mechanical plant engineers can be found in almost every business sector and industry and are responsible for maintaining large facilities. These individuals usually monitor their facility's heating, cooling and ventilation systems. Additionally, physical plant engineers must also service and repair their facility's plumbing and lighting. According to 2010 data published by the U.S. Bureau of Labor Statistics, the national annual mean salary for a stationary engineer was $52,620. These individuals earned a national mean hourly wage of $25. Physical plant engineers, stationary engineers and boiler operators have a strong background in mechanics. Individuals working in this field often receive formal apprenticeship training with the International Union of Operating Engineers or formal education through vocational or trade schools. Certain states may require licensing for positions in this field. Generally, employers prefer to hire people with at least a high school diploma or GED who have experience in the field.
  •  
    "Physical plant or mechanical plant engineers can be found in almost every business sector and industry and are responsible for maintaining large facilities. These individuals usually monitor their facility's heating, cooling and ventilation systems. Additionally, physical plant engineers must also service and repair their facility's plumbing and lighting. Physical plant engineers are paid an average salary of at least $50,000 to make sure a plant's systems run safely. "
gabybilk

Hospitality & Tourism: An Introduction to the Industry - Robert A. Brymer - Google Books - 0 views

shared by gabybilk on 20 Nov 19 - No Cached
  •  
    To briefly summarize, as mentioned in the section of the book, a physical plant of a hospitality operation compromises of the ground, exterior and interior finishes, building systems, FF&E, HVAC systems, and plumbing too. Protecting the physical plant ensures the hotel controls and minimizes energy. Maintenance cost is a big concern when overseeing the physical plant sense it is such a big portion of the hotel. Technical and managerial functions must be performed to ensure the hotel is running smoothly and all maintenance are being kept up and to check that energy is not being wasted.
snesbeth

The Importance of Infrastructure: Planning for the Future - 0 views

  • Unlike a commercial building where cabling systems have an economic life of 5 to 10 years, the physical plant of a hotel is much more difficult to change in the future.
  • hotels still require an increasingly sophisticated cable plant.
  • This network complexity should be addressed sooner rather than later in the building process and pre-opening phase.
  • ...2 more annotations...
  • It’s time that hoteliers stopped overlooking the importance of infrastructure, and start ensuring it is addressed during a major renovation or re-development project.
  • It is much more expensive and very difficult to re-wire a hotel in the future, than it is to plan ahead for changes.
  •  
    The article discusses how the physical plant of a hotel is important to consider during the early phases of building the establishment because it can get much more expensive later on if it is not dealt with from the beginning. The author believed that this simple detail is what separates a prosperous hotel a part from a retired hotel company. They also noted that trying to take care of the physical plant during a remodeling phase or a major renovation project would be a good alternative to ensure that the physical plant is thought out appropriately.
sliu043

Hotel Maintenance Management Software Saves Time and Money - 0 views

  • Benefits of Hotel Maintenance Management Software
  • • Track, assign, and prioritize incoming work orders • Mapping functions allow you to view the work the needs to be completed in a list view or highlighted on a map of your existing floor plan • Generate comprehensive maintenance and inventory reports to help you plan your annual budget • Access your hotel’s maintenance management software remotely so that you can instruct your employees while you aren’t at work • Monitor the amount of hours each employee works • Manage corrective actions • Create a scheduled maintenance calendar • Keep track of lost and found items • Manage suppliers and contractors • Manage hotel information needed for periodic hotel inspections • Track your on-site inventory • Dispatch tasks to selected employees • Track energy and water usage to spot unusual trends that could indicate a problem
  • Impress Your Guests
  • ...12 more annotations...
  • hotel maintenance management software allows you to implement a plan for scheduled maintenance. By regularly maintaining the equipment used in each room, you can spot problems early on and fix any issues.
  • Save Money by Conserving Energy
  • With hotel maintenance management software you can track the amount of energy and water that is normally used at your hotel on any given day. You can also set alerts to notify you if an excessive amount of energy or water is being used.
  • In addition to spotting problems, your new maintenance management software can monitor high-energy consumption equipment, like boilers or walk-in freezers, to ensure that the equipment maintains an energy-efficient level of operation. Not only does this help decrease your hotel’s costs, but guests like to know that they are staying in a hotel that is environment friendly
  • Track Your Inventory Levels
  • With hotel maintenance management software, you can track the levels of all of your supplies so that you know when you need to place inventory orders.
  • In addition to tracking your inventory, you can also track your suppliers and allow your suppliers to have access to the amount of inventory you have on hand. This gives you access to the suppliers contact information if you need to place an order and allows you to contract suppliers that can monitor your inventory levels and automatically ship what your hotel needs.
  • Track and Prioritize Your Work Orders
  • Tracking work orders allows you to see which work orders are open, in progress, and completed as well. Because your employees will always know what needs to be completed, they can easily stay on task
  • Track Your Employees Hotel maintenance management software also allows you to track all of your employees’ information. You have the ability to create work schedules for your employees, monitor the amount of time each employee works, track corrective action, and run payroll reports. Having all of this information located in one place makes it easy to manage multiple employees.
  • Plan Your Annual Budget
  • You can separate the expenses by department and use the information gathered in detailed reports to help you create each department’s budget for the following year. This way, you know an average amount of money that each department spends per month so that you allocate your funds appropriately.
  •  
    In this article, the author has introduced how a hotel maintenance management software does good to a business in the hospitality industry. The physical plant software enables hotels to be more efficient to manage bookings, monitor utilities and sort finances, which helps ensure daily operations run smoothly. There are several benefits of the physical plant software mentioned in the article. Firstly, the software allows hotels to implement a scheduled maintenance plan. By regular maintenance, hotels can spot problems and fix the issues. In addition, the software enables hotels to track the amount of energy and water, which will help save money and decrease the costs. Moreover, the software allows hotels to track the levels of all of the supplies and allow the suppliers to have access to the amount of inventory the hotels have on hand. Next point, such software has the ability track and prioritize work orders. Not mention the software allows hotels to track all employees' information, which makes it easy to manage multiple employees. Lastly, the physical plant software helps hotels plan an annual budget by tracking all of the hotel's expenses.
anonymous

How physical and cybersecurity threats converge around mass-participation events - - 0 views

  • any event that attracts large audiences also attracts those who want to make an illicit profit, cause disruption, or inflict physical harm.
  • organisers have to build a strategy to identify, manage, and mitigate the physical and cybersecurity threats that can converge around mass-participation events. It’s essential to take a holistic approach as, ultimately, physical and cyber threats cannot be neatly separated into two distinct threat types.
  • The security team should include stakeholders from across the organisation to bring the right intelligence into focus. Trust and transparency between different departments is essential if the team is to function effectively.
  • ...2 more annotations...
  • Threat actors use multiple channels, both on the surface and deep & dark web (DDW), to discuss and plan disruption and money-making schemes. It’s important to note, too, that the channels used by bad actors evolve all the time as they work to evade detection.
  • Security teams should certainly pay attention to previous incidents and successful tactics, but must build their strategy around the very latest intelligence.
  •  
    Physical and cyber security must coexist at mass participation events as threats can be in both forms. Organizers must create strategies to identify, manage, and mitigate these threats that can devastate events. This can be done with a multi-disciplinary security team and clear visibility to build intelligence. Information sharing and private sector engagement are also important tools within this process.
Yuting Peng

Tech-Laden Hotels Call for Modern Disaster Plans - 0 views

  • the plan has assumed a new life as both a disaster prevention and action schematic for all physical plant systems, computer systems, appliances and all normal uses of the facility. The plan revolves heavily around backup generators and battery power for electricity, as well as services that run on electrical power.
  •  
    It often happen in hotel that the physcial plant system has some problem.The plan resolves heacily around backup generators and battery power for electricity. Lota's plan contain every system, if hotel obey the plan I think they can operate better.Make sure every physical plants in a good working condition.
  • ...1 more comment...
  •  
    It is realize that the potentially harmful effects that utility service interruptions can have on the hotel's many operating systems. With the Y2K threat just a memory, the plan has assumed a new life as both a disaster prevention and action schematic for all physical plant systems, computer systems, appliances and all normal uses of the facility. The plan revolves heavily around backup generators and battery power for electricity, as well as services that run on electrical power. If a fire, earthquake or other disaster causes a blackout, guests will most likely have to be alerted via the intercom. That system has a battery backup. The phone system also uses backup generators, which can also power message lights on the individual units if there's a problem.
  •  
    The duty engineer is also supposed to walk through all machinery spaces to check for any flooding or hazardous conditions. If the outage is of an unspecified "long duration," the duty engineer is also bound to continually check the fuel level of the emergency generator and request that the manager call the contractor for more fuel when the fuel level reaches half-full.
  •  
    The Sheraton hotel in California is the place for business travelers in the high-tech and government sectors. And to avoid the potentially harmful effects that the utility service interruptions can have on the hotel's many operating systems, the manager came out with a detailed engineering contingency plan. This plan is originally intended in prat to address potential Y2K woes. The plan assumed that a new life as both a disaster prevention and action schematic for all physical plant systems. 
xwang083

Why the Future of Data Storage is (Still) Magnetic Tape - IEEE Spectrum - 1 views

  • 实际上,世界上的许多数据仍然保存在磁带上,包括基础科学的数据,例如粒子物理学和射电天文学,人类遗产和国家档案,主要电影,银行业务,保险,石油勘探等。甚至还有一群人(包括我在内,接受过材料科学,工程学或物理方面的培训),他们的工作是不断改善磁带存储。
  • 首先,磁带存储具有更高的能源效率
  • 。磁带也非常可靠,错误率比硬盘驱动器低四到五个数量级。
  • ...10 more annotations...
  • 在2015年,在信息存储产业联盟,包括惠普企业,IBM,甲骨文和Quantum,与学术研究团体的摆沿着一个组织,发布了它所谓的“国际磁带存储路线图。” 该预测预测,到2025年,磁带存储的单位面积密度将达到91 Gb /平方英寸。推算趋势表明,到2028年,它将超过200 Gb /平方英寸。
  • 它应该以每年约33%的历史速度继续运行很多年,这意味着您可以预期容量大约每两到三年翻一番。可以将其视为磁带的摩尔定律。
  • 尽管有所有这些优点,但公司使用磁带的主要原因通常是简单的经济学。磁带存储的成本是将相同数量的数据保留在磁盘上所需要支付的费用的六分之一,这就是为什么在几乎所有存储大量数据的地方都可以找到磁带系统的原因。
  • Disk drives are reaching their limits, but magnetic tape just gets better and better
  • Indeed, much of the world’s data is still kept on tape, including data for basic science, such as particle physics and radio astronomy, human heritage and national archives, major motion pictures, banking, insurance, oil exploration, and more. There is even a cadre of people (including me, trained in materials science, engineering, or physics) whose job it is to keep improving tape storage.
  • Tape has survived for as long as it has for one fundamental reason: It’s cheap. And it’s getting cheaper all the time. But will that always be the case?
  • Indeed, it should continue for many more years at its historical rate of about 33 percent per year, meaning that you can expect a doubling in capacity roughly every two to three years. Think of it as a Moore’s Law for magnetic tape.
  • But the rate at which data can be written to tape is, surprisingly enough, more than twice the rate of writing to disk.
  • To enable this degree of scaling, we had to make a bunch of technical advances. For one, we improved the ability of the read and write heads to follow the slender tracks on the tape, which were just 100 or so nanometers wide in our latest demo.
  • For example, in 2011, a flaw in a software update caused Google to accidentally delete the saved email messages in about 40,000 Gmail accounts. That loss occurred despite there being several copies of the data stored on hard drives across multiple data centers. Fortunately, the data was also recorded on tape, and Google could eventually restore all the lost data from that backup.
  •  
    Recent advances in big data analysis and artificial intelligence create powerful incentives for companies to accumulate information about every measurable aspect of their business. Due to the huge amount of information, the company's demand for cost reduction is higher and higher. Research shows that the amount of data recorded is growing at an annual rate of 30% to 40%. At the same time, the capacity of modern hard disks used to store most hard disks is growing at less than half the rate. Most of this information does not need immediate access. For things like this, tape is the perfect solution. In fact, most of the world's data are still stored on magnetic tapes, including data from basic sciences, such as particle physics and radio astronomy, human heritage and national archives, major films, banking, insurance, oil exploration, etc. There is even a group of people (including me, trained in materials science, engineering or Physics) whose job is to constantly improve tape storage.
tjcamino

Physical Structure of Management Information System - 4 views

  • combination of people, hardware, communication networks and data sources that collects, transforms and distributes information in an organization.
  • Hardware
  • Important components include the central processing unit, input/output devices, storage units and communication devices.
  • ...10 more annotations...
  • Software
  • Software can be divided into two generic types: system software and applications.
  • Applications are developed to accomplish a specific task.
  • Database
  • A database is a centrally controlled collection of organized data
  • Procedures
  • Three types of procedures
  • user instructions, instructions for input preparation and operating instructions for MIS
  • Personnel
  • The personnel in the MIS function include computer operators, programmers, systems analysts and managers.
  •  
    When learning about the role of a MIS manager, I feel it's very important to learn the Physical Structure of the MIS. This article explains that the MIS is combined of hardware, software, database, procedures and personnel. When using MIS, it will help with decision making with accurate information then send to managers. These systems are vital to the day to day operation of a hotel.
  •  
    This is a great article that explains the basic physical structure of management information systems. Like other computer systems, the hardware and software components of MIS must work together for its use. While the hardware comprises of physical components such as the CPU and storage units, software provides a GUI. the article also discusses the personnel, procedures, and databases in MIS.
rrodr658

How Virtual Reality (VR) can Enrich the Hospitality Industry - 3 views

  • Through this, users can experience a virtual recreation of different aspects of travel, from the flight, to arrival, to some of the key sights.
  • These tours can be made available on hotel websites, allowing guests or potential guests to take a look at their hotel room, or other parts of the hotel, before they book or before they arrive.
  • allowing customers to look for flights, compare hotel prices and book rooms through a virtual reality headset.
  • ...12 more annotations...
  • Within the hospitality industry, VR has become particularly important, because of the amount of information the average customer needs before they will actually book a hotel room. Rather than reading through descriptions, which may or may not be trustworthy, it offers customers the chance to experience things for themselves.
  • Virtual reality is a computer technology, which utilises images, sounds and physical sensations to make users feel as though they are physically present in a virtual world. Virtual reality technology typically makes use of VR headsets and this equipment enables users to look around and immerse themselves in a digital environment.
  • Virtual reality, or VR for short, is one of the biggest emerging technology trends and the business world is gradually coming to terms with the various opportunities it provides. For those in the hospitality industry, virtual reality has particular appeal, because it can digitally transport potential customers to a hotel or travel destination.
  • While many of the applications of modern virtual reality are entertainment-based, businesses are increasingly getting to grips with VR’s potential as a marketing tool, delivering important information to potential customers in a way they can actually experience, and stimulating multiple senses in the process.
  • allows customers to experience a virtual recreation of a room within a hotel, or take a look at one of the nearby attractions. Essentially, this allows the hotel industry to benefit from the type of ‘try before you buy’ marketing
  • Virtual reality hospitality strategies can help to improve the quality of experience provided at almost every stage of the customer journey. Yet, this can be taken to the next level by embracing the metaverse
  • allow customers to experience nearby attractions once they have arrived, adding to the hotel experience itself.
  • is one of the biggest emerging technology trends, and the business world is gradually coming to terms with the various opportunities it provides.
  • Virtual reality is a computer technology, which utilizes images, sounds, and physical sensations to make users feel as though they are physically present in a virtual world. Virtual reality technology typically uses VR headsets, enabling users to look around and immerse themselves in a digital environment.
    • rrodr658
       
      VR definition/explanation
  • allows customers to experience a virtual recreation of a room within a hotel, or take a look at one of the nearby attractions. Essentially, this allows the hotel industry to benefit from the type of ‘try before you buy’ marketing
    • rrodr658
       
      VR experiential marketing
  • Virtual Travel Experiences
    • rrodr658
       
      one of the main reasons how VR is being used in hospitality and tourism. VR travel experiences such as tours.
  • Trainees can improve their housekeeping skills in realistic virtual settings and gain valuable insights through interactions with lifelike avatars. VR allows trainees to learn from mistakes, even serious ones, without the anxiety of real-world effects.
    • rrodr658
       
      VR used as a training tool to help staff improve and refine their skills. It allows for virtual simulations to happen and practice possible outcomes.
  •  
    Virtual Reality is enhancing the way travelers can decide if they want to book their hotels, by allowing them to take virtual tours of the hotel or experience local attractions via virtual trials, some of these examples include checking out local beaches, even simulated scuba diving. Some of these 36o videos are truly remarkable and I can see how this can encourage guests into booking their trips because it certainly makes me want to try all of these activities.
  • ...2 more comments...
  •  
    This article discusses the ways VR is utilized in the hospitality industry. It then goes to explain how potential clients can have virtual visits before actually booking.
  •  
    The article is providing examples for the technology of Virtual Reality (VR) and its ability to boost the hospitality Industry. VR has been used more as an entertainment tool but it is now progressively seen as an useful and important marketing tool, as it delivers life like experiences through stimulation of the senses.
  •  
    Virtual reality is a computer technology, which utilizes images, sounds, and physical sensations to make users feel as though they are physically present in a virtual world. For those in the hospitality industry, virtual reality has particular appeal because it can transport potential customers to a hotel or travel destination. The full potential of virtual reality within the hotel industry is only just being recognized.
  •  
    This article goes over how VR/AR is currently impacting the hospitality and tourism world. The main reasons for its big impact on the industry and how the technology is being applied. It mentions examples and touches a little bit on the metaverse topic. It also has a separate article that explains further on AR & AI in the hospitality industry.
asanc036

Understanding Digital Business Models: Virtual Restaurants And Ghost Kitchens - 1 views

  • difference between a virtual restaurant and a ghost kitchen
  • both models are part of an emerging restaurant segment that primarily exists online, with no physical storefront and with a major focus on off-premise dining and delivery.
  • a recent report by Statista predicted that worldwide
  • ...27 more annotations...
  • Virtual Restaurants
  • 324 billion in 2022
  • online food delivery revenue will reach over $
  • physical kitchens
  • work with existing restaurants and kitchens, from mom-and-pop diners to big chain
  • perators of commercial kitchen spaces,
  • Typically, an eatery may only be utilizing some 30% productivity out of their kitchen and labo
  • incremental orders can increase revenues and margins, particularly as labor costs rise,
  • boon for existing restaurateurs who have off hours, where the kitchen and staff are under-utilized
  • only exists online
  • designed and optimized for an off-premise (only pick-up and delivery) experienc
  • 30 or more individual commercial kitchens, with one central area for delivery drivers to pick up from
  • matter
  • additional costs, including rent, equipment, freezer/storage space, garbage pickup, staff salaries, runner fees
  • virtual restaurants
  • require a top-notch marketing plan
  • A winning digital-only restaurant marketing plan should include leveraging national partnerships with the online ordering/delivery platforms, sophisticated digital marketing, search engine optimization and social media
  • professional food photography, menu design
  • strategies
  • if you are not listed on a certain app, you simply don’t exist
  • reviews
  • typically house a variety of brands, from national players like Chick-fil-A and Wendy’s
  • more than ever
  • about
  • mindful
  • arrival experience of the food
  • Set up your own website
  •  
    Alex Canter, CEO of Nextbite and Ordermark explains the difference between virtual restaurants and ghost kitchens. Both exist online, with no physical storefront. A report by Statista predicted online food delivery revenue will reach over $324 billion in 2022. Virtual Restaurants - only exist online, work with existing restaurants and kitchens. Helps increase productivity of their kitchen and labor, increase revenue and margins. Ghost Kitchens - Physical kitchens designed off-premise (pick-up and delivery only). Some have 30 or more individual commercial kitchens for rent and one area for delivery drivers to pick up. These kitchens house many brands and new local restaurants for a rent fee. Virtual restaurants require great marketing strategies, such as digital marketing, SEO, social media, professional photography and menu design. Some of the strategies suggested for success are utilising and being part of apps, focusing on the reviews, setting up a website.
ketie005

Hospitality & Tourism - 0 views

  •  
    Physical plants are very important in the hospitality industry and it's one of the factors that determine customer satisfaction. We live in a world where sustainability and smart room technology start changing the guest's expectation. Along the fact that the hospitality facilities have to look great, the physical attractiveness, they also have to be safe and that's where sustainability and smart room technology come in. The maintenance of a facility depends on how sustainable and smart a building is.
Le Chai

Technology Used in Hospitality Security | SDA Security - 1 views

  • Smart cards and RFID (which stands for radio frequency identification) are contactless keys and work by actually sending small radio frequencies to receiving sensors
  • A guest can opt for fast check-in, wherein he gives the hotel his phone number and downloads an app.
  • the smartphone.
  • ...3 more annotations...
  • biometrics involves granting access and identifying a person by his physical traits, a thumbprint or iris scan, for instance.
  • ing a person by his physical traits, a thumbprint or iris scan, for instance.
  • With the face recognition capabilities, a hotel, casino, or restaurant can keep track of suspicious customers—or slacking employees—to make sure they don’t cause any trouble.
  •  
    Security is obviously very important in hospitality and technological advancements are helping to make hotel stays easier and more secure. The hotel industry is exploring options to that replaces the standard plastic keycards with new entry methods. One example is using smartcards or RFIDs, which stands for radio frequency identification. Smartcards and RFIDs work like a fast-pass at a gas station when quickly paying at the pump. The guest simply waves the card/key in front of a sensor granting entry. The guest doesn't have to worry about the card being deactivated by his or her cell phone and the hotel doesn't have to constantly spend on replacements. Another example is technology that allows us to enter our hotel rooms using our using our phones. Guests would download an app, receive a text message with an encrypted sound code and play it by the door to be granted entry. Using biometrics for entry is likely the ultimate level of technological security. Like in the movies, guests would have their physical attributes scanned including eyes, and/or thumbprint to identify a guest. Video cameras will always be a great form of security. Now that they're getting smaller and more vivid, surveillance makes the phrase "Big Brother is watching" all the more relevant by being a huge crime and incident deterrent. Technology is advancing rapidly and I can see some of these methods hitting mass markets sooner than we think.
  •  
    This article talks about the new technologies applied in the hotel to keep safety. The first one is Smart cards/RFID that helps to open the door via sensor receiving. The next one is smartphone, personal belongings that help to open the door with encrypted sound code. Biometrics also can help by identifying personal physical traits. For hotels, security cameras is necessity. 
anonymous

Physical Plant Management - 1 views

  •  
    Planning to save resources, the physical plant management performs maintenance in hotels to repair equipment and other materials that are found in hotels. This paragraph describes the ways that a maintenance worker in the physical plant department of a hotel can repair and support his task in a daily basis using an HVAC system to keep track. Some examples are cleaning, repair any broken items, and install objects, do electrical work, control electricity, work with computer systems, assist when technical help is needed and so much more. This article specifically points out its physical plant system to make sure those hotels and other businesses use it in the right way.
hectorpachon

Tourism Management - Developing Product - Tutorialspoint - 0 views

  •  
    "Plainly, the physical plant is nothing but the destination with sound and catchy architecture that enhances tourists' experience." But it doesn't stop there. The physical plant must have an interaction with other topics to complete the product, to make it appealing to our guests and lately to create a loyalty to the brand. Physical plant, service, hospitality, freedom of choice and involvement are the steps for developing a product.
jessicahoyos

Physical Structure of Management Information System - 0 views

  • The physical components of an MIS include hardware, software, database, personnel and procedures
  • Related How to Create a Master Calendar Learn More → A management information system (MIS) is an organized combination of people, hardware, communication networks and data sources that collects, transforms and distributes information in an organization
  • Important components include the central processing unit, input/output devices, storage units and communication devices.
  • ...4 more annotations...
  • For users of MIS it is much more important to understand the software than the hardware. Software maintenance can take 50 to 70 percent of all personnel activity in the MIS function. When the organization moves to implement an advanced information system the hardware and software environment becomes more complex.
  • The database improves efficiency of storage by elimination of redundant files and improves efficiency of processing by providing all required data in a single file rather than separate files.
  • Three types of procedures are required for an MIS to operate effectively: user instructions, instructions for input preparation and operating instructions for MIS personnel who maintain the MIS.
  • The quality of MIS personnel is a key factor in its effectiveness. An MIS manager needs a combination of both managerial and technical skills.
  •  
    This article describes with components of an MIS, specifically the physical ones. It explain what each component is used for and how they differ. I think this is important to understand first, to understand the purpose the hardware, software, database, personnel and procedures.
Yookyung Kim

Tips for Cashing in on Geofencing | Top Stories | | Hospitality Magazine (HT) - 0 views

  •          When a loyal customer arrives in a new city, send a notification offering early check-in and room upgrade
  • ·         After the customer makes a selection, he/she is directed to the hotel shuttle. ·         Once checked in, a notification is sent about happy hour in the lobby offering a free drink. ·         When guests head out for a meal, the app can be accessed to find recommended restaurants. ·         Set up the app with an “offer wallet” that will have discounts and coupons for area attractions. ·         At check-out, a notification is sent asking the guest to fill out a quick survey.  
  •  
    With the mobile marketing technology, hospitality companies focus on finding innovative ways to personalize communication with customers, and the one of solutions is LOCATION. Geofences, or virtual perimeters placed around physical locations, unlock the knowledge to consumers' physical whereabouts. Upon geofence entry or exit, hotels can send promotional, informational push notifications to app-holding customers. By offering personalized, contextually sensitive content, brands will increase buyer motivation and encourage customer loyalty.
YIZHE YANG

e-business strategy - virtual value chain - 0 views

  •  
    Over the years, some businesses have controlled almost all factors of production and distribution (Ford in its early days) whereas others have outsourced almost everything (Dell). In the early days of industry, large enterprises controlled and owned most factors of production and businesses like Ford Motor Company in the USA had their own foundries, railroad, forestry and electricity generating plants, In the UK, Cadbury's and Lever Brothers went so far as to build villages and amenities for their workers. The motivation for this vertical integration was varied but included cost and quality control, worker loyalty and protection of proprietary processes. As well as control of production, resources and employees, businesses like Ford also controlled the retail sales and service network.
  •  
    The virtual value chain, created by John Sviokla and Jeffrey Rayport, is a business model describing the dissemination of value-generating information services throughout an Extended Enterprise . This value chain begins with the content supplied by the provider, which is then distributed and supported by the information infrastructure; thereupon the context provider supplies actual customer interaction. It supports the physical value chain of procurement, manufacturing, distribution and sales of traditional companies. To illustrate the distinction between the two value chains consider the following: "when consumers use answering machines to leave a message, they are using an object that is both made and sold in the physical world, however when they buy electronic answering services from the phone company they are using the marketspace-a virtual realm where products and services are digital information and are delivered through information-based channels." (Rayport et al. 1996) Many businesses employ both value chains, including banks, which provide services to customers in the physical world at their branch offices and virtually online. The value chain is separated into two chains because the marketplace (physical) and the marketspace (virtual) need to be managed in different ways to be effective and efficient (Samuelson 1981). Nonetheless, the linkage between the two is critical for effective supply chain management.
apate114

Top 5 risks and security challenges for hotels in 2015 - eHotelier - 0 views

  • 1. Identity theft leading to credit card fraud
  • Identity theft and credit card fraud is the new form of pick pocketing, but on a much larger scale. The number of compromised credit cards is expected to increase this year.
  • 2. Silent invasions
  • ...11 more annotations...
  • 3. Longer or no security audit cycles
  • APTS are considered the most dangerous type of cyber-attack as they simply bypass the defenses that are in place.
  • Cyber-crime shows up on the security radar as the second highest risk the hotel industry is exposed to.
  • The gap between the low number of qualified security auditors worldwide and new hotels built is getting bigger and bigger.
  • Nearly 1.26 million hotels worldwide are dealing with all sorts of safety & security issues.
  • 4. Physical crime will remain an issue for hotels
  • Physical crime ranges from professional burglaries using nifty social engineering techniques to temporary drug laps in hotel rooms.
  • Holdups at night involving firearms have increased since hotels are easily accessible and less protected compared to other industries operating at night.
  • 5. Loss of competitive advantage after a major security incident
  • The recovery costs after a security incident, including the attention of the media, are often much higher than the investment in security and risk management.
  • Reputation is a vital yet fragile advantage that requires its very own security plan in a strong competitive market where guests nowadays love to make their booking decisions with the help of online travel review sites such as Tripadvisor & Co.
  •  
    The article highlights the top five risks and security challenges in the hospitality industry. The following are the top five security risks according to the article. 1. Identity theft leading to credit card fraud - compared to other industries, the hotel industry is at more risk for credit card fraud and identity theft. This is because hotels are highly targeted by hackers. Hotel properties for the most part have credit card information for each and every guest that has stayed at a specific property. Hotels must be ahead of the technology curve when it comes to security however this is not always the case. 2. Silent invasions - This consists of all the cyber attacks that can affect a business by infecting the network. As discussed during the first module, hotels run majority if not all of their business using technology. If a hotel were to have their networks hacked it would leave them in a very bad situation. Since hotels operate their entire business using technology and multiple different systems, they would not be able to operate if they experienced a network breach. 3. Longer or no security audit cycles - Most branded hotels are required by the franchise to have consistent security audits done for each property. Independent hotels are deemed greater at risk for a security attack because they are not mandated to have security audits. These hotels sometimes skip audit cycles to save money. 4. Physical crime - This ranges from professional robberies to drug laps in hotel rooms. Hotels are at risk for armed robbery due to to lower chance of security compared to other industries that operate overnight. 5. Reputation risk - Hotels that experience a security breach almost always will see some sort of loss in competitive advantage. Nowadays with social media and the news travelers are more aware with what is going on and they would be more inclined to book their reservation somewhere else if they heard of the property having a security breach.
msbode

Ensuring Software Integrity in IoT Devices - 3 views

  • oT is defined as the Internet of Things. The Internet of Things refers to the ever-growing network of physical objects that feature an IP address for internet connectivity, and the communication that occurs between these objects and other Internet-enabled devices and systems
  • Gartner predicts that there will be 20.4 billion connected Internet of Things (IoT) devices by 2020, with 5.5 million new things getting connected every day
  • more than half of major new business processes and systems will include an IoT component by 2020
  • ...9 more annotations...
  • Manufacturers are rushing products to market with little or no thought to security, often including hardcoded passwords or known vulnerable software libraries. While this problem is most obvious in the consumer space (which gets the most news coverage), vulnerable IoT devices are present in every business sector as well
  • The TPM stores secret keys, passwords, and digital certificates in its secure internal storage protecting them from software and physical attacks. The TPM acts as a root of trust for checking platform integrity at boot time (i.e., check against any malicious change). A cryptographic hash value of the platform configuration is calculated and compared against the precomputed hash value of the platform. Access to the platform is denied if the integrity check fails [4]. This is the beginning of the “chain-of-trust” for software modules that are subsequently initiated. This transitive trust mechanism is one of the important security features in trust computing. It uses the trust root as a starting point to establish a chain of trust model, in the order of trust root, boot loader, OS, and Application.
  • Secure boot provides the foundation for Trusted Boot, which extends the trust boundary to the boot process and eventually the operating system.
  • software attestation attempts to achieve a dynamic root of trust without specific hardware support. This method has the advantage of not requiring any stored secrets (cryptographic keys or passwords) and allows applications or modules to be updated, which may not be possible if hash values are stored in immutable formats, such as a TPM chip
  • While Secure Boot validates the platform and firmware, Trusted Boot is generally defined as verifying each software module before execution and extending the chain-of-trust to the entire operating system. During the boot sequence, the digest of each executing program is recorded before it executes. A TPM (Trusted Platform Module) is used to store all these records and then report on them securely.
  • It is important to note that Trusted Boot requires a TPM chip so the operating system can see the chain of execution, thus it may not be an option for some IoT devices. Lack of trusted boot support would allow an attacker with physical access, or using a software vulnerability during run time, to potentially modify the stored code and compromise the device.
  • There are many other attack possibilities to consider with IoT devices. For example, existing TPM architectures do not support runtime integrity checking and this allows attackers to exploit vulnerabilities to modify the program after it has been verified (at time of check or TOC) but before the time of its use (at time of use or TOU) to trigger unintended program behavior, such as the execution of malicious code or the leaking of sensitive data
  • Physical attack is a viable method of compromising the integrity of a device. Modifying and replacing firmware by an attacker may be worth the effort, depending on the perceived value of the device or the data it may access (such as a video camera or ATM). Attackers can go as far as removing memory and reading its contents.
  • a device built today can become a major problem tomorrow
  •  
    The purpose of this article was to review the available literature on the subject of ensuring software integrity for IoT (Internet of Things) devices, focusing on detecting and preventing modification of the original software, so that the device cannot be used for unintended purposes. The literature reviewed; secure boot, trusted boot and runtime security. Concluding that no one single control is going to adequately protect a device the solution based upon 25 years of experience is to create a multi-layered approach to security that starts at the beginning when power is applied, establishes a trusted computing baseline, and anchors that trust in something immutable that cannot be tampered with. Additionally, because a device built today can become a major problem tomorrow, due to them having hardcore keys "set and forget", the internet will then have literally billions of obsolete hosts in the coming years. Therefore it is important for MIS Managers/ Consultants investigate how to change the game in order to mitigate the damage or economic value of new systems being breached and by asking questions such as 'Can we even in the presence of a malicious attacker offer some limited form of security for the most valuable transactions (such as e-banking) or assets?' and 'Can we make the 'business' of the attackers less attractive by applying security technologies that are particularly tailored towards destroying the business model of the attackers?'
mannypinto

Five Ways Brands Can Adapt For The Era Of E-Commerce - 0 views

  •  
    This article is very interesting because it talks about how establishments like Sports Authority and Toys 'R' Us are out of business due to e-commerce sites like amazon, ebay, Jet.com and others. It explains how businesses can adapt to an era of e-commerce. The first thing a business can do is to consolidate inventory, in other words have all the inventory in one single pool instead of different channels like brands have done before. The second thing is to establish a two-day shipping network, here the article explains how consumers expect immediate gratification with online orders. We see grocery stores doing this but with faster shipping within hours. The third thing one can do is leverage from an existing e-commerce channels for visibility. A business can sell its products on networks that are already established such as amazon, Jet.com and ebay. The fourth thing a business can do is use brick-and-mortar channels to increase exposure, meaning using physical stores such as Sports Authority and Toys 'R' Us to help increase exposure. It explains that drop shipping to these companies will help sales, 0% of all retail purchases still happen in physical stores. The final thing a business can do is use its resources. It is important to have an e-commerce expert on your payroll to grow the business online which will help in sales and stay on top of the this era. The article finishes by explaining that adaptability is the future of retail, which I believe adaptability is the future for any business. It is important to adapt and keep making things easier and more convenient for consumers.
1 - 20 of 324 Next › Last »
Showing 20 items per page