Skip to main content

Home/ Hospitality Technology/ Group items tagged protecting

Rss Feed Group items tagged

yyr997

React Mobile Introduces Sidekick Bluetooth 5.0, the World's First High-Capacity Panic B... - 0 views

  •  
    Innovative wearable device ensures hotel staff can quickly alert for help anytime and anywhere on property, making personal safety accessible at the touch of a button React Mobile, the original inventor of the BLE panic button and market-leading hospitality safety technology provider, is excited to announce the launch of the newest version of their Sidekick Bluetooth Panic Button. With easy one-click panic alarm activation, the elegant device is the fastest way to alert for help without the need to find a phone, putting security within reach, when it counts.
  •  
    Security issues are also very important in the hotel industry. This Bluetooth device can quickly seek protection for employees and guests.
bhern082

Panama Residence Inn implements VingCard RFID locks | Hotel Management - 0 views

  • the hotel recognized the need to implement advanced security solutions in order to provide each guest with peace of mind throughout their
  • stay.
  • Hotel leadership opted to implement Elsafe Zenith safes and VingCard door locks
  • ...5 more annotations...
  • The presence of VingCard locks and Elsafe electronic safes throughout the hotel ensures that each area is fully secure while allowing those authorized to seamlessly gain access with minimal effort.
  • With guests increasingly expecting the instant convenience of digital key functionality, Essence's mobile access-ready design further equips property leadership with the ability to provide the feature without the need for additional hardware or installation.
  • with mobile access-ready abilities so that guests and their belongings can be protected using the latest in encryption technology while future proofing operations to meet evolving guest needs.
  • With Classic RFID, the property's staff-only locations can likewise benefit from the latest in encryption protocols to ensure that only those with authorization can gain access. 
  • With Classic RFID, the property's staff-only locations can likewise benefit from the latest in encryption protocols to ensure that only those with authorization can gain access
  •  
    This article refers to the Residence Inn Panama City implementing VingCard RFID locks in their suites and staff only areas. This technology helps improve the hotel and makes it easier to implement future technologies like apps that can be used as the room key. With Classic RFID, the property's staff-only locations can likewise benefit from the latest in encryption protocols to ensure that only those with authorization can gain access. This form of IT helps make this property more accessibly and up to date with technology.
lclar060

Miami Beach Cracking Down On Restaurant Scams - 0 views

  •  
    Restaurant fraud is a vile act in which customer unknowingly are taken advantage of by restaurant staff members. The article referenced Miami, a primary tourist area in South Florida, have seen where customers complain of being charged double the amount of the quoted rate for food. In other instances, customers are solicited by specials buts again charged more than the initial rate. To protect the destination and rid the area of tacky and or false advertising information, city officials have implemented strict laws. So far, compliance have been enforced and violators charges accordingly.
marvahb

Technology and Electronics Reviews - USATODAY.com - 0 views

  • Unfortunately, only 44% of retail storefronts have chip card readers enabled on their POS systems,
  • While no system is 100% secure, most can be made much safer than they are. But not all retailers take the necessary steps
  • Consumers can try to protect themselves by looking for retailers that have enabled chip-based credit and debit card use on their POS terminals
  • ...1 more annotation...
  • Even so, there are still lots of these thefts, in which criminals insert malicious software into a company's point-of-sale (POS) system. The malware surreptitiously records credit and debit card information when customers swipe them through payment terminals. It later sends the card information to the thieves, who sell it on the Internet underground, known as the dark web
  •  
    This article is well worth the read. It informs us as to why our credit cards keep getting hacked although our favorite retail stores seems to have secure POS systems. There is actually lots of time and money that needs to be invested in order to have a secure POS. Many of these hacks keep happening because companies wait until it's too late to upgrade to chip reader POS or a higher performance security
natashacastro

The Future of Tulum, Mexico: A New $12,000 Penthouse and More Luxury Development in Par... - 0 views

  • Despite the shock to this hip, bohemian town, the future is slowing starting to look up for this popular destination on the Mexican Riviera.
  • waves as one of the most expensive restaurants in the world and catering
  • Nomade, Nest and new developments from existing resorts like Jashita, Sanara and Be Tulum, including high-end luxurious offerings never before offered in the area.
  • ...10 more annotations...
  • The new development is inspired by nature
  • All the materials we use are 100% natural, the wood we use is 100% recycled,
  • When discussing the future of Tulum, Sebastian says, "I see how the evictions affected the image of Tulum and it is going through tough times. We want to preserve the magic of Tulum, protect their people and the nature, there are more initiatives towards sustainability, and you see how the locals and the hotel's restaurants and business owners are shifting to the ideal of keeping Tulum safe.”
  • “In our properties, we are also implementing sustainability initiatives, and our goal is to become 100% sustainable, we are looking at new ways to approach energy, water and food.
  • hift in hospitality is toward a light construction with light elements and materials, with very low impact on the ground and the ecosystem, while still maintaining high levels of comfort. It's all about the experience.”
  • restaurant features amazing vegetarian food.
  •  Our design and mantra are Natural Simplicity.
  • The Sanara Jungle Villa is set back enveloped by a natural green garden
  • Daniella, have now been so embraced that we are launching The Real Coconut product line as well as opening restaurants with USA mega companies, Whole Foods and WeWork.”
  • eco-tourism with agricultural initiatives.”
  •  
    I found this article to be extremely interesting since I have been wanting to travel to Tulum for a while now. I was also aware that many of the hotels are focused on preserving their natural resources and maintaning their beautiful town, but I did not know to what extent. One thing I found to be so important was how many hotels are vegan or vegetarian. At first it doesnt seem like a huge deal, but when one realizes how the consumption of meat is bad for the environment, it really makes a huge difference. I think it is really cool that Tulum is trying to create menus that are better for the environment and healthy for their guests. Another thing that the article examines is how the new hotels in Tulum are staying true to their town and keeping things natural. For one example the hotel called Be Tulum is using materials that are 100% natural with wood that is 100% recycled. With having every detail of the hotel with purpose, it really changes the atmosphere of the hotel for the better. The idea here which the article explains is that hotel and shop owners are trying their best to keep Tulum safe and sustainable. The owner of Be Tulum said he was implementing sustainability intiatives and finding new and better ways to approach energy, water and food, which I think is what they are doing by being vegetarian. Overall there seems to be a movement of green initiatives in place for the future for Tulum.
yimengliu

The First 5 Benefits of an HRIS Solution - 0 views

  • It’s true that you can manage and archive HR documents and employee information in your HR software, and that’s essential for meeting compliance requirements and protecting yourself from legal ramifications.
  • How Your HRIS Adds Value to Your Company
  • Reduce Paperwork
  • ...2 more annotations...
  • Ensures Greater Compliance
  • Your customer service is only as good as your employees. Use your HRIS to implement and manage a strategic onboarding and training process that gives new hires every advantage to reach their potential.
  •  
    This article is talk about how they can use the HRIS adds value to the company. HR software tosses a life preserver to companies drowning in paperwork and the demands of an increasingly digital workplace. There have a lot of benefits of the HRIS to the company. First of all, HRIS can help deduce paperwork. Most of company spend a lot of money to manager paper. Companies spend upwards of $8 billion every single year. That is a lot of money if company have to pay it all the time. Second, ensures greater compliance. It's necessary to make sure the right paperwork. The mistake not good for company's reputation. Last, enhance customer service. HRIS can make the training process accurate.
ovila009

5 biggest cybersecurity threats | 2021-02-03 | Security Magazine - 0 views

  • Since the beginning of the pandemic, the FBI has seen a fourfold increase in cybersecurity complaints, whereas the global losses from cybercrime exceeded $1 trillion in 2020. 
  • In 2020, almost a third of the breaches incorporated social engineering techniques, of which 90% were phishing.
  • Ransomware is a data-encrypting program that demands payment to release the infected data. The overall sum of ransom demands will have reached $1.4 billion in 2020, with an average sum to rectify the damage reaching up to $1.45 million.
  • ...5 more annotations...
  • here were 4.83 million DDoS attacks attempted in the first half of 2020 alone and each hour of service disruption may have cost businesses as much as $100k on average.
  • Third party software. The top 30 ecommerce retailers in the US are connected to 1,131 third-party resources each and 23% of those assets have at least one critical vulnerability.
  • umber of the attempted breaches grew by 250% compared to 2019.
  • The global market for cloud computing is estimated to grow 17% this year, totaling $227.8 billion.
  • To strengthen the cloud computing defenses in the future, stakeholders should pay attention to proper cloud storage configuration,
  •  
    This article breaks down the 5 largest threats we face in terms of cybersecurity. Since the pandemic started, cybersecurity complaints have increased fourfold. These losses are piling up dramatically, necessitating an increased level of vigilance and preparedness.
teresaricks

Cyber Security In The Hotel Industry | protel - 4 views

  • And phishing isn’t the only strategy these computer thugs use, either. Just about every hotel in the world could be vulnerable to malware, ransomware, spam, hacking and social engineering. 
  • The argument for educating staff on cybersecurity is a simple one: if staff don’t know how to recognize a security threat, how can they be expected to avoid it, report it, or remove it?
  • the 2019 State of IT Security Survey found that email security and staff training were listed as the top problems faced by IT security professionals.
  • ...16 more annotations...
  • Yet, more than 30% of staff surveyed by Wombat Security Technologies didn’t even know what phishing or malware was. This is probably why scams like the Business Email Compromise (BEC) result in whopping losses of over $3 billion (according to the FBI).
  • But as humans, hoteliers make mistakes, they’re trusting of fake identities, tempted by clickbait, and vulnerable to other sneaky tactics used by criminals to gain access to company information.
  • Staff need cybersecurity training to protect themselves and the hotel against cyberattacks.
  • By making employees aware of security threats, the impact they might have on your business, and what procedures to follow when a threat has been identified, you’re strengthening the most vulnerable links in the chain.
  • The World Economic Forum in their latest report, The Global Risks 2019, puts cyber-attacks and data theft into the higher-than-average likelihood bracket during 2019.
  • To achieve these record levels of data breaches and cyber-threats, cybercriminals are focusing their attention on the manipulation of human behavior.
  • So how do we counter these threats? Education, education, education. 
  • Security awareness training is not a point event or solution, it is a process. Security awareness comes out of a series of ideas, thoughts, and preparations that are used to develop a holistic security awareness training program.
  • Identify the Specific Cybersecurity Needs of the Hotel/Property   
  • Include Cybersecurity Awareness Training During Onboarding
  • Cover Relevant Topics
  • Make Staff Cybersecurity Training An Ongoing Process
  • We all make mistakes and occasionally slip up. It is really important that staff know that they can come to you and that they are free to report problems without there being a risk of them losing their jobs. This will come from your personal management style. 
  • Cybersecurity is everyone’s responsibility, whether you are C-level, management, accounting, housekeeping, maintenance, or reception, it does not matter. Everyone needs to be made aware of the hotel’s individual cybersecurity policies, attitude, and culture. 
  • Continuously send reminders via email, Slack, or any other messenger your hotel may be using with reminders to change passwords, to update anti-virus programs, and with information about the latest phishing techniques.
  • If you create a culture of cybersecurity awareness within your organization, then the chances of your organization becoming a victim are greatly reduced.
  •  
    This article stresses the importance of providing cybersecurity training to staff in the hospitality industry.
jalilahst

What is Network Redundancy and Why Does It Matter? - 0 views

  • Network redundancy is the process of adding additional instances of network devices and lines of communication to help ensure network availability and decrease the risk of failure along the critical data path.
    • jalilahst
       
      Defines Network Redundancy.
  • Redundancy in networks helps to eliminate single points of failure to ensure better network stability and uptime in the face of events that would otherwise take th
  • e network offline
  • ...11 more annotations...
  • A fault-tolerant redundant system provides full hardware redundancy, mirroring applications across two or more identical systems that run in tandem
    • jalilahst
       
      1 form of redundancy that data centers use.
  • fault-tolerance redundant systems are complex and often expensive to implement.
    • jalilahst
       
      Disadvantage to fault tolerant redundant systems.
  • If something goes wrong with one server, the backup servers take over and restart applications that were running on the failed server.
    • jalilahst
       
      How high availability works, the 2nd form of redundancy that data centers use.
  • it does tolerate a certain amount of downtime in that there is a brief loss of service while the backup servers boot up applications.
    • jalilahst
       
      Disadvantage to high availability software based redundant system.
  • create a network strategy that reviews existing infrastructure.
    • jalilahst
       
      First steps of network redundancy plan.
  •  Well-maintained UPS systems can ensure that servers can switch over from electrical power to backup generator power without losing any data or applications.
  • the best places to replicate and store data so it can be easily accessed in the event that other redundant systems fail and the main network goes down. By using more than one data center, companies can ensure that even if some disaster occurs, they will be able to carry on with minimal disruption.
    • jalilahst
       
      The importance of backing up data offsite.
  • They can test different connections by physically disconnecting hardware to make sure failover occurs as anticipated. If things do not go as planned during testing, data center managers then create an after-action report that lists the items they need to fix as a result of the testing.
  • creating incident response plans that can counter them is crucial for ensuring network resiliency in the face of modern cyber threats. Network redundancy can be a crucial aspect of many cyber incident response plans.
  • attacks are a type of cyberattack where the goal of the attacker is to render a target network or service unusable
    • jalilahst
       
      DDoS definition
  • By blending a variety of ISPs, data centers can leverage their connectivity to help reroute network services when a DDoS attack is underway. vXchnge’s vX\defend, for instance, uses diverse traffic routing options to identify and bypass volumetric attacks without compromising bandwidth or increasing network latency.
    • jalilahst
       
      prevent DDoS attacks by implementing redundant networks with flexible internet access.
  •  
    Network redundancy is the process of enhancing network devices and lines of communication to help safeguard network availability and decrease the risk of failure along the critical data path. Redundancy in networks purpose is to help eliminate specific areas of failure to guarantee better network stability and availability when the network would otherwise be offline. Optimize network redundancy by backing up data offsite and conductions frequent test to measure its durability and maintain it. Protect the network from malicious attacks is also important. By creating plans for when attacks occur by rerouting network services.
vickychapas2021

10 Things You Should Know About Recycling Electronics - 1 views

  • The Environmental Protection Agency estimates that only 15 to 20 percent of e-waste is recycled,
  • the rest of these electronics go directly into landfills, incinerators and are illegally exported to developing countries
  • These foreign junkyards hire low-wage employees to pick through the few valuable components of often toxic old machines.
  • ...9 more annotations...
  • The E-cycling Central website allows users to select their state and city to find a trusted recycler nearest them.
  • Reuse is always more environmentally sound and will give devices an extra couple years of usability.
  • One is called the e-Stewards Standard for Responsible Recycling and Reuse of Electronic Equipment, known as e-Stewards, and the other is called Responsible Recycling (R2) Practices, known as R2.
  • If an electronics recycler has either one of these certifications they are typically more trustworthy than a recycler without one.
  • With that being said, it is best to recycle your electronics as soon as you know you are done using them.
  • Before you recycle or donate your computer or cell phone, be sure to erase your data from the device.
  • CRT TV’s, printers, cartridges and many large home appliances are dangerous to recycle, so consumers should expect to pay a small fee to recycle them.
  • Don’t throw nickel cadmium batteries in the garbage! They’re made from poisonous materials that can harm the environment—and they also need to be recycled.
  • cell phone batteries can be used to make new smartphones and batteries, while zinc and aluminum from laptops and tablets can be used for metal plates, jewelry, cars or art.
  •  
    This article explains what e-waste is and how we as consumers can help recycle our e-waste. We should recycle products we know we won't use anymore because technology depreciates. When we decide to recycle our e-waste we should ensure that they are reputable. Throwing certain things in the garbage is toxic to the environment and thus we should make sure to recycle all technology instead of tossing it into the landfill.
andreagordon99

10 Disadvantages & Risks of Cloud Computing | by Sarah Lavinski | FAUN | Medium - 1 views

  • Cloud Computing is a combination of the use of computer technology (computing) and Internet-based development (cloud). Cloud is a metaphor of the internet, as is the cloud that is often depicted in computer network diagrams.
  • data and cloud protection must be good because if it won’t be dangerous for data confidentiality.
  • weakness of public cloud is where everyone accesses the same server and server and will increase the risk of attack, and down the server.
  • ...2 more annotations...
  • Marketplace companies such as Amazon, Alibaba and Airbnb have considered cloud computing risks and benefits.
  • Disadvantages of cloud computing that has less security can cause data leak to public.
  •  
    This article discusses the risks and disadvantages with cloud computing. Some people love using the cloud and they find it the best way to save their information. Others prefer the use of an external hard drive. While there are pros and cons to both companies should not only rely on cloud computing. As you can find in this article there are some definite disadvantages that need to be worked out before this becomes our only tool for saving information.
swhit149

What is Green Computing? - Definition from Techopedia - 0 views

  • Green computing is the environmentally responsible and eco-friendly use of computers and their resources.
  • study of designing, engineering, manufacturing, using and disposing of computing devices in a way that reduces their environmental impact.
  • reen computing practices came into prominence in 1992, when the Environmental Protection Agency (EPA) launched the Energy Star program.
  • ...7 more annotations...
  • green information technology (green IT).
  • attain economic viability and improve the way computing devices are used.
  • Green use
  • Green disposal
  • Green design
  • Green manufacturing:
  • authorities also actively work to promote green computing concepts by introducing several voluntary programs and regulations for their enforcement.
  •  
    This article discusses what Green Computing is and how it is being used. This environmental friendly resource should be the future on how we preserve used technology. Everyone should be more aware on how to promote green computing to make this world a much sustainable place.
jiayi017

Can we fix our way out of the growing e-waste problem? - BBC News - 0 views

  • Can we fix our way out of the growing e-waste problem?
  • he 50 million tonnes of e-waste generated every year will more than double to 110 million tonnes by 2050, making it the fastest growing waste stream in the world, according to the author of a UN report.
  • But e-waste from discarded electrical and electronic products is only part of the problem. A significant contributor to e-waste is the release of toxins from mining and manufacturing.
  • ...10 more annotations...
  • "The issue of electronic waste is overlooked, as electronic items that could be fixed easily go to waste instead, contributing to pollution and increasing the demand for components like rare earth elements, which can have a damaging impact on the environment when sourced."
  • The rare earth elements being mined are currently crucial components in high-tech electronics, but they are hazardous to extract.
  • "But the truth is that one in five people - at best - are going to be motivated to do that, so for the remaining four out of five, we need to put systems in place that are convenient, that match their lifestyles and enable us to get the electronic equipment back... into the next item."
  • "There is the high risk that the pollutants are not taken care of properly, or they are taken care of by an informal sector and recycled without properly protecting the workers, while emitting the toxins contained in e-waste," Prof Williams says.
  • By far the biggest contributors to the level of e-waste are household appliances such as irons, vacuum cleaners, washing machines and fridges.
  • There are rules on the management of e-waste. Sellers of electrical and electronic equipment (EEE) within the European Union must provide ways for customers to dispose of their old household device when they sell them a new version of the same product.
  • "This project allows you to reduce waste, extend the life of objects, and it helps people who cannot afford to get rid of items that have developed a fault," he says.
  • world-wide collections are stagnating or even decreasing
  • In countries where there is no national e-waste legislation in place, e-waste is likely treated as other or general waste. This is either land-filled or recycled, along with other metal or plastic wastes
  • the rapidly-growing "Internet of things" - internet-connected gadgets - is expected to generate e-waste at a faster rate, as connectivity becomes embedded into everyday items
  •  
    How e-waste is being manage in some countries and what people are doing to reduce their impact on e-waste.
  •  
    This article mainly introduces the problems caused by e-waste and related solutions. E-waste not only affects environmental issues such as rare earth elements when it is landfilled or incinerated, but also the mining of its equipment manufacturing also affects the social environment, because a certain amount of emissions may be released in the process. Toxins are a great harm to the environment and the human body. Therefore, with the continuous emergence of e-waste disposal problems, some companies such as Apple and Sony have begun to extend the life of their equipment in recent years, and encourage customers to trade-in for recycling, making a certain effective contribution to the growing e-waste.
sigomezsh

Data ownership: The next big issue enterprise IT will have to tackle - 0 views

  • The reason why the issue of data ownership has become somewhat unclear is because oftentimes organizations are not in direct possession of their data.
  • Consider how many business applications are currently available as software-as-a-service (SaaS) applications. In most cases, a SaaS provider hosts their SaaS application and also stores the data that the application generates.
  • Whenever possible, organizations should back up their SaaS data. This not only protects the data against accidental loss, but it also provides the organization with a tangible copy of its SaaS data.
  • ...3 more annotations...
  • While it is true that SaaS providers likely store your data on encrypted storage, it is also likely that the SaaS provider maintains control over the encryption keys that are used when accessing the data.
  • A SaaS provider might sell data (or insights into the data) to advertisers, government agencies, research analysts, or even your competitors.
  • After all, data leakage and breaches can have devastating financial consequences, and companies simply cannot afford to take a chance on a cloud provider that plays games with subscriber data.
alo328

How the Internet of Things (IoT) can Benefit the Hospitality Industry - 2 views

  • Many within the hospitality industry have already incorporated the Internet of Things into their businesses, because the technology offers a number of crucial benefits that are especially relevant to hotels. These benefits range from allowing companies to save on energy costs, through to delivering a better customer experience.
  • This can improve data collection, increase levels of automation and allow for multiple devices to be controlled or monitored from one centralised place, such as a phone or tablet.
  • the main way is through delivering a superior customer experience.
  •  
    Internet of things Internet of things will continue to lead hotels to be more Eco-friendly, technological advanced and enhance guest satisfaction. Allowing guest to have the ability to customize there room to there exact expectations. Guest today are more conscience of the environment and allows them control energy usage. With more technology in a hotel means more upgrades to network, upgrades more security to protect the hotel data. Finally guest like new and shiny, this will allow hotels to market the hotel as the most technological advanced hotels. Guest will like to stay at hotels that meet their needs for tech upgrades and they would be willing to pay more for these hotels.
  •  
    The way the article reports the IoT, I feel its a positive advancements for the guest experience. With the trend of mobile devices having multiple uses, making travel accommodations and services at the control of ones finger tips seems logical and progressive. Using the Internet to enhance the guest experience allows staff to continue to provide quality service. The information the article report's presents technology as an aid and not a replacement of personnel.
  •  
    An emerging trend in recent years, specifically in the hospitality industry has been the IoT (Internet of Things). It is referred as the " inclusion of internet connectivity within everyday devices and appliances ". Hotels have begun incorporating different types of technology, which has allowed companies to provide a better customer experience, manage energy costs, and automate certain processes. Bluetooth,GPS, and Beacon technology, electronic key cards,voice controlled customer service are just few of examples of how the internet is used to provide a new hospitality experience.
nunes305

PCI Compliance for HOTELS: What you need to know (PCI-DSS) - 2 views

  • In Spain, one of the world’s leading travel destinations, hotels accounted for a $2,995 million revenue in 2017, showing an annual growth rate of 6.0% In France, it reached $4,946 million, and UK recorded a $5,746 million revenue the same year.
  • The growing contribution of the hotel segment to the GDP of many countries worldwide, among with the increase in revenue and data theft, made credit card security a top concern. As a result, the PCI-DSS security standard became an essential consideration for hotels, becoming absolutely obligatory fromf 2018.
  • t defines the best practices for card security that every company should implement, affecting all hotels independently from their size or location. The purpose is to reduce as much as possible the risk for fraud, data theft, identity theft, and other threats.
  • ...2 more annotations...
  • As a global industry that generates an overwhelming revenue of 550 billion dollars annually, the hospitality industry seems to be one of the most attractive segments for credit card breaches and data theft.
  • Credit card storage – many hotel managers are under the wrong impression that only digitally stored credit card information must be protected, but this is not true. In fact, under PCI Compliance and privacy laws, all paper documents containing personal data must be physically secured and adequately restricted at all times.
  •  
    PCI Compliance for HOTELS: What you need to know (PCI-DSS)
  •  
    Thanks for the summary. It's comforting to know that countries in Europe are getting on board with being PCI compliant, one less thing to worry about when using credit cards internationally for booking, shopping or entertainment.
dbonn009

Why Personalization Is the Future of Hotel E-Commerce – Skift - 2 views

  • he hotel industry has an opportunity to transform the direct booking process using website personalization. Doing so can help deliver a more efficient and customized booking experience, resulting in better conversion ratios and the opportunity to further cultivate relationships with guests.
  • Personalization in the hotel industry has ceased to be a trend. Today, it’s an obligation.
  • Back in 2015, American Express Travel reported that 83 percent of millennials would allow brands to track their habits in exchange for a more customized experience
  • ...16 more annotations...
  • And earlier this year,
  • Deloitte Consulting published the white paper
  • noted that “–truly knowing your guests –what they have told you, what they request, what you have learned, and what should be implied –should yield larger results.”
  • using new technology-driven tools to help them streamline the booking process and create a more seamless guest experience.
  • When potential guests are shopping on a hotel’s website, there’s a clear opportunity before a booking is made for properties to demonstrate the acute attention they’ve paid to individual guests’ preferences. This is accomplished by using website personalization technology, allowing hotels to automatically and intuitively suggest particular room categories, package types, and even rates tailored to each user’s expectations.
  • he results of these improved personalization efforts are numerous, including higher booking probability, increased user satisfaction, and a greater likelihood of repeat visits to the website, leading to better brand loyalty. Taking these steps can even offer hotels a further tool to take more control of their distribution decisions, rebalancing their e-commerce strategies between direct and non-direct channels.
  • Building Loyalty is an Investment
  • over-relying on OTAs for cash customers hurts profitability.
  • Today’s personalization technology can also help hotels to optimize the conversion rates for direct bookings.
  • If this analysis shows that more users are bouncing from the site instead of booking, it may be time to consider new tools.
  • “When users leave a hotel’s website, they’re likely to have forgotten the details after visiting multiple other hotel-related sites,” he noted. As Upneja believes, personalization tools are one method to prevent this. “Appeal to them on the spot with personalized offerings like the right price, the right room category and the right amenities before they can move on.”
  • Personalization tech is increasingly an essential tool to rethink online bookings. But in order for it to succeed, there needs to be alignment between the personalization of the booking experience and the hotel’s curation of more traditional on-site amenities like service and design.
  • That site is available on both desktop and mobile, and in English and Spanish, the primary languages spoken by the hotel’s two main markets.
  • Using IP addresses also enables the Viceroy Los Cabos to personalize resort packages to users in locales suffering from bad weather.
  • “Ideally we want to sense that behavior and adapt the site for them, showing them customer reviews, social media posts, food and beverage photography – things that we know will be a strong call to action for the customer to continue through to making that reservation.”
  • Today’s hotelier recognizes the value that personalization has on the guest experience. The more guests feel that every aspect of their experience was tailored exactly for them, the greater the likelihood that they will spend more on property and return again and again.But in today’s competitive market, truly savvy hotel executives realize that it is no longer enough to only customize during the guest stay. Personalization needs to extend to the booking process, where the right tools give hotels the means to increase conversions, build better loyalty and customize content in order to deliver more direct bookings.
  •  
    On my previous article about Oraculo, the world's first predictive algorithm for hotels, I described how personalization in hospitality is no longer a trend but an obligation. By posting this new article I wanted to dig a little deeper into tailoring guests needs through e-commerce. In 2015, American Express Travel reported that 83% of millennials would not object to have their habits tracked if they get a more customized experience. This strong message has prompted the hotel industry to develop and implement website personalization technology that suggests, intuitively, specific room categories or packages to online lookers. Since building loyalty is an investment, improving the direct booking ratio is now the main goal of the industry. From experience, when I travel I try to stay at the same hotel and book directly from the hotel website. The most important thing to me when I shop around is furniture and bathroom. Although these are not generally specified in detail in room descriptions, the brand I'm loyal to is usually very consistent with my needs. If new technology would give me a more personalized stay somewhere else I would definitely change my membership. I have friends who don't travel much except for vacation and long weekends. They are lookers who go to online travel agencies (OTA's) and bounce from site to site trying to find the perfect place. The article explains this newer technology will be crucial to prevent lookers from bouncing to other websites, and encourage them to book directly from the hotel and avoid OTA's. The idea is to make it so personalized that it will be appealing on the spot. These new technologies not only can tailor room types and resort packages based on IP addresses, but it can customize your TV programming based on your web history. Personalizing the guest experience during the stay is no longer enough. Data shows that in order to build loyalty and make the customer return, personalization has to begin in the booking pr
  •  
    This article describes how personalization of eCommerce can bring better profits, because it is helping guests personalize how they would like their stay. This is more efficient for the guests because it is ensure they get what they want, like if they want to be around certain theme parks, or if they want their rooms a certain way. They even have options where you can fit guests language barriers, like if they speak only spanish they can change the language so spanish speakers can also ensure they have their preferred stay.
  •  
    This article explains the importance of website personalization. Here, vital information is stored for current and future use of consumers. It is important for industry professionals to have access to this information but protect it from reaching outside entities.
shanegmark

Chinese travel companies show penchant for embracing cloud services - ChinaTravelNews - 0 views

  • Imagine today’s scenario where any established travel technology/ e-commerce company is required to process 3-4 billion travel itineraries on a daily basis! With the need to handle searches at faster speeds, it is imperative to diligently cache at the edge of the cloud. Managing the scale and being in control of the cost structure is vital, and cloud is an integral part of the solution.
  • While this is a common phenomenon with start-ups, legacy companies like airlines, banks etc. struggle with such transition from a traditional hosting environment.
  • The biggest challenge that any company faces when they put their business in cloud remains the issue of data security management, mentioned Wang. 
  • ...1 more annotation...
  • Referring to security, Heinze mentioned that end-to-end encryption takes care of security of data in transit. “But data at rest (when data collects in one place, it is called data at rest) still demands a concerted effort to protect it.
  •  
    Article discussing the challenges and benefits that Chinese hospitality companies are dealing with when implementing cloud solutions. There are a couple examples of this process from hotels and an airline.
andreae22

My Head in the Clouds (computing): A Case Study of a Restaurant Group Embracing Off-Sit... - 0 views

  • These applications simplify daily tasks for management teams and staff, which will ultimately leverage senior management down to focus on the bigger picture
  • he year was 2010 and the impending doom of PCI Compliance was upon us.  At best, our network infrastructure was dated and we needed to act quickly to get it into compliance.
  • CI Compliance is an almost unachievable set of network security standards designed to protect the credit card giants, who already charge them way too much for credit card processing and continually squeeze them with a plethora of monthly fees. 
  • ...21 more annotations...
  • The Payment Card Industry Data Security Standard (PCI DSS) is a set of security standards designed to ensure that ALL companies that accept, process, store or transmit credit card information maintain a secure environment
  • he restaurant industry is also plagued with security breaches, including large chains such as Darden (Cheddar’s), Panera Bread, Sonic and Arby’s.
  • Operators must identify network vulnerabilities, physical vulnerabilities, and operational vulnerabilities that could result in a credit card breach and fix them.  In summary, it is a painfully tedious, extremely time consuming, and potentially expensive process
  • It is extremely important for the security of our guest’s payment information, both for ensuring trust with our customers and limiting legal liabilities
  • PCI DSS is mandatory for any and all businesses that accept credit cards.  It involves a process of assessment, remediation and reporting.
  • egacy systems such as Positouch, Micros, and Aloha are bulkier, more expensive, and much harder to program and implement.
  • In a nutshell, PCI DSS forced us to upgrade our network, which ultimately allowed us to operate in the cloud.  This unintended outcome to a painful requirement was truly a blessing in disguise and it pushed us into new territory – the cloud!
  • IBM defines cloud computing as “the delivery of on-demand computing resources — everything from applications to data centers — over the internet on a pay-for-use basis.”[iii]
  • ud computing can streamline our operation.
  • The first order of business was to get our network infrastructure in order.
  • Toast
  • It is extremely intuitive, like using a smartphone, thus needing very little training. As wireless POS solutions evolve, legacy systems will eventually be phased out.  It is only a matter of time.
  • EMV (Europay, MasterCard and Visa) is another set of regulations that are coming to the restaurant industry. “EMV is a global standard for cards equipped with computer chips and the technology used to authenticate chip-card transactions.”
  • Pay My Tab will fully integrate with our POS system and eliminates many bulky PCI DSS requirements.
  • llows for remote access, allowing management to check flow of service, identify unique reservations, and make sure that waitlists are being managed appropriately. 
  • good communication is key for making sure work-life balance is maintained.
  • An area which the cloud has really saved our restaurants time is with food & beverage inventories. 
  • This has greatly improved productivity and allowed our management teams to communicate in real time.
  • Our office hardware now consists of much less expensive “Network Computers”, which do not require expanded memory for giant program
  • Although the solutions highlighted above create efficiency and save time, they do not serve guests and they don’t understand the art of hospitality
  • It is imperative that as restaurateurs we continue to create a positive environment, embrace innovation, and engage and train our employees in the art and skill of hospitality.
  •  
    This article is an case study on how one restaurant group could use cloud computing to improve their business. By not only securing the companies information by the customers as well. Reviewing the key points of sales interactions between customers and the restaurant, like the POS, Tableside payments, reservations and management assistants.
« First ‹ Previous 381 - 400 of 494 Next › Last »
Showing 20 items per page