Skip to main content

Home/ Hospitality Technology/ Group items tagged protecting

Rss Feed Group items tagged

tredunbar

7 POS Trends for 2020/2021: Latest Predictions You Should Be Thinking About - Financeso... - 2 views

  • global point of the sale terminals market is expected to reach USD 108.46[1] billion by 202
  • One of the biggest POS industry trends right now is mobile payment transactions which saw a 40.2% year on year growth[2]
  • it’s also important to have a reliable billing and invoicing program together with your POS sale
  • ...30 more annotations...
  • 54% of consumers[4] in the US preferred to use their debit cards to make payments
  • 46% of US consumers rarely use money[4] anymore
  • 45% have security as their top priority. Offering a secure payment method improves the trust your customers have with your business.
  • using mobile devices like tablets and mobile devices to make transactions faster
  • 53% of retailers and business owners are upgrading their POS[3] systems
  • Asia Pacific countries have fully embraced the use of mobile payment methods. eMarketer found that more than 45.2% of China’s population use mobile payment[8] for their everyday use. 
  • 61% of quick-service restaurants in the US have embraced cloud-based POS[5]. In fact, 60% of new merchants are asking for cloud POS[6] rather than legacy POS.
  • 61% of merchants[7] are looking into getting cloud-based POS
  • Cloud-based POS replaces all of that with a single app. Any update will come from the cloud to whatever device you are using.
  • you can make the transition to the cloud-based system slowly
  • Most cloud-based POS can integrate with the programs that your business is already using
  • Accepting mobile payments for your business is easy. It mostly consists of scanning codes or tapping the smartphone on the terminal and authenticating the transaction
  • Mobile POS offers convenience as it takes the point of sale system to the customer, rather than the other way around
  • Accepting mobile payment methods allows lines to move faster and gives your customers a sense of satisfaction
  • Mobile payments are safe to use. A lot of these systems are EMV compatible and use the latest secure credit card processing technology to protect you and your customers
  • 15% of businesses in the US are already using AI-enabled POS
  • Prevent fraud and ensure customer information is secure through an AI
  • AI can personalize a customer’s behavior and offer relevant product displays based on their past purchases
  • AI lets you know your customer’s buying habits. That way, you can order more of what’s being bought, increasing profits
  • 83% of shoppers are willing to provide their information[11] in exchange for a personalized experience
  • Get insights on what your customers are purchasing more of. This gives you an idea of what they are going to buy next based on their most recent purchase from your store
  • create a comprehensive marketing strategy that can help promote your brand and products
  • present real-time data in an easy to understand format like a graph
  • payment options include smartphone payment options that support RFID like Apple Pay, Samsung Pay, and Google Pay
  • instead of waving the device over the POS terminal, customers will need cellular data to complete the transaction
  • A mobile POS system often consists of a tablet that accepts card, cash, and mobile payment options. Additionally, these systems can also be used as a standalone register for a self-checkout kiosk
  • a reliable POS system, you can easily keep track of everything in your store
  • It can also serve as a digital menu, where customers can input their orders. The orders will be sent directly to the kitchen, encouraging customers to order more
  • Rather than giving the card to a server and letting them run the transaction at the counter, customers can pay from the table
  • retail shops that offer self-checkouts, you can make your mobile POS into a static till
  •  
    The article focuses on trends that companies utilizing a POS system should look at deploying. Bolstered by figures supporting the success of the emergent trends, the article seeks to encourage operators to make the move sooner rather than later. The most prominent trends revolve around more efficient payment access. Customers appreciate the speed and available payment options. Companies are also able to manage customer data effectively and securely while also managing inventory and marketing. AI integration is also a forward trend that is allowing businesses to tailor their tactics to each customer individually. Perhaps the most important trend that is affecting other transaction systems as well is cloud based POS.
robfitzpatrick

The Importance of Hotel Staff Safety Technology During and Post-Pandemic - By Robb Monk... - 0 views

  • he discussion of hospitality staff safety has gained significant momentum, as workers from hotels around the world have come forward with cautionary stories of workplace injury, guest misconduct, or harassment.
  • many properties are using this downtime to make sure they comply with the deployment of personal alert systems, also known as panic buttons.
  • he devices are intuitive, require little training, and easily integrated with existing hotel systems
  • ...17 more annotations...
  • The Stand-Alone LTE device offers hotels an all-in-one solution capable of protecting employees both on and off property without the need for a tethered smart device.
  • Sidekick
  • s designed to pair with company-issued mobile devices to provide a truly seamless safety solution for the mobile workforce
  • BLE beacon device is a discreet, easy to conceal device that allows our safety platform to deliver precise room level location accuracy indoors in multi-story buildings.
  • In a crisis scenario, hotel staff can press their React Mobile Sidekick panic button to transmit an SOS signal.
  • making personal safety accessible at the touch of a button
  • mmediately identify the precise location of an incident.
  • Bluetooth beacons placed throughout the property,
  • a Stand-alone LTE panic button, which transmits the same, location-specific information
  • apable of connecting to any available cellular network, and is compatible with third-party hardware.
  • better reliability and lower service costs for hoteliers.
  • the system relies on GPS coordinates to follow an incident in real-time, relaying that information back to support services
  • BLE 5.0 Beacon provides incredibly precise location information even within a high-rise building.
  • he device identifies the closest BLE beacon. It then reports the precise room number and GPS coordinates,
  • o remedy any concerns, hotel properties will be expected to adopt frequent and stringent disinfection measures of guest rooms and public areas, with some staff members dedicated solely to the upkeep of new protocols.
  • housekeeping department
  • ill be more integral to successful operations than ever before. Ultimately, workers should feel confident, and with the peace of mind of knowing that help is just a click away,
  •  
    The article is interesting as it talks about the use of proximity beacons that we have been learning about this week for marketing purposes; however, this article highlights the technology being used in employee security. In recent years hotels have increasingly committed to enhancing employee safety policies, training, and resources such as employee safety devices or ESDs. These are mostly implemented in the housekeeping department, where the employees are often alone in guest rooms and can be vulnerable. Amid the global pandemic, safety for both guests and employees is at the forefront of the industry's priority list. Many companies are taking advantage of this downtime to install personal alert systems or panic buttons. While ESDs are not necessarily new and have been around for some time, the technology has drastically improved. React Mobile, a leading provider of panic button solutions for hotels, has three updated products for the modern age. The Sidekick, which needs to be tethered to a smartphone, is a small panic button that transmits an SOS signal to alert management that an employee is in an emergency situation and requires assistance. The device is discrete and wearable, and with the aid of Bluetooth beacons, it can identify the employee's precise location. The Stand-alone LTE panic button has all the same features of the Sidekick; however, it does not need to be tied to a cellphone. It automatically connects to any available 4G cellular network to send out the SOS transmission. The BLE 5.0 Beacon offers the most advanced and incredibly accurate location information, even within high-rise hotels. When activated, it is so precise that it can provide the exact room number in which the incident occurs. These technologies can also be used outside the hotel property, where the system sends out GPS coordinates to follow an incident in real-time. This security technology provides hotels with the ability to immediately respond in emergency situations and gives t
biancafavilli

Tourism security in an age of cyber threats | NTA Courier - 0 views

shared by biancafavilli on 13 Feb 20 - No Cached
kmert005 liked it
  • the safety of clients and staff has to be the No. 1 priority.
  • hat means contingency plans must be updated on a regular basis and security plans must show adequate flexibility to incorporate good customer service and proper protection.
  • it is essential to dispel the idea that tourism security is static.
  • ...4 more annotations...
  • leisure travel is an expendable industry, and there is nothing that can destroy the industry’s reputation more effectively than a lack of security or safety.
  • the latest threat to the industry was underlined by the hacking of Marriott International’s Starwood database, potentially exposing the personal information of approximately half a billion people.
  • This cyberbreach serves as an example that the world of tourism security is fast-changing.
  •  It is essential that every tourism entity assume that, at some point, it will suffer some form of attack, whether physical or cyber. Do not wait for an attack to occur to begin to figure out how to mitigate the damage. Remember that an attack not only damages the client, but it also harms the entire industry.
  •  
    In this article, the author emphasizes that security in the tourism industry should be number one. With the advent of technology, cyber contingency plans must be a part of the overall security plans of tourism businesses. The author also admonishes hospitality businesses to be proactive when dealing with cyber security breaches to withstand malware and infections as well as to be honest with customers when security breaches occur to maintain the customer's trust.
jordanfernandez

Proximity Marketing: Often Creepy, but It Doesn't Have to Be. | Center for Digital Ethi... - 0 views

  • Imagine you’re out shopping one Saturday afternoon. You walk into a department store and see a big sign that reads, “Get our app and save!” You love a good deal so you scan the QR code and select “download.” You scroll through a user agreement with about 10,000 words of legalese and click “agree.”
  • As you walk down the street later, your phone is abuzz with notifications you’ve never received before: a constant stream of ads from each store you pass. You wonder how they’re reaching you, until you realize the department store app is still running — it must connect to other stores.
  • Target merged its “Cartwheel” coupon app — used by 27 million shoppers, saving them more than $1 billion — with the main Target app and incorporated new features.
  • ...9 more annotations...
  • This beats traditional advertising, which connects to consumers before they’re in a store — while they’re sitting on the couch at home watching television, for instance — and relies on them to remember the message later.
  • By using proximity marketing technology, stores can catch up by providing some of the perks of online shopping in person, like easy access to discounts, saved shopping lists and personalized recommendations.
  • Lastly, proximity marketing tools allow companies to gather behavioral data about their customers, including how often they visit a store and when, how long they stay and what areas of the store they gravitate toward.
  • Proximity marketing — location-based direct marketing in which a business or other organization sends offers, promotions, alerts or other messages to a person's smartphone based on the device’s location — is annoying, creepy and downright invasive in this story. But it doesn’t have to be. When implemented ethically, proximity marketing can provide worthwhile benefits to marketers and consumers alike.
  • But completely opting-out of proximity marketing — agreeing to all or nothing — should not be the only way consumers can protect themselves.
  • Their recommendations include displaying in-store signage notifying shoppers that their location data is being collected, letting consumers opt-out of analytics services, limiting how data is used and never selling personally identifiable data to a third party.
  • If retailers want their customers to shed the “malicious” connotation that comes with data tracking, they need to be upfront about how they are using that data, including location.
  • Target’s privacy notice is currently 4,359 words and the top of the page reads, “We may change or add to this privacy policy, so we encourage you to review it periodically.” How many customers read the whole statement and check back periodically for updates?
  • So let’s reimagine our scene in the department store: Again, you download its app. This time, the user agreement is a few clear bullet points. The app walks you through a quick Q&A to find out if it can access your location to make your shopping experience easier. It asks if it can share your information with its partners — other stores, whose names the user agreement lists out explicitly — and gives you an option to opt out.
  •  
    This article addresses what proximity marketing is and how it can be beneficial to marketers and consumers if done right. It talks about how companies throw hundreds of pages of legalese when downloading new apps that people never read. They recommend to include displaying in store signage notifying shoppers that their location data is being collected, letting consumers opt out of analytic services and limiting how data is used without selling personal identifiable data to third party. I believe if companies make it easier for us to trust them with our data more people will use this style of marketing.
mtedd003

Cyber Security Marketing Tactics That Actually Work - 0 views

  • Whether you want to attribute it to the rise of interconnected devices in the IoT revolution or just the growing instances of cybercrime, the cyber security industry has seen immense growth in recent years and shows no signs of stopping.
  • This should come as no surprise given that the average annual cost of cyberattacks worldwide is about $9.5 million, according to Ponemon Institute.
  • clearly a need for effective cyber security products and services, there are also many solutions on the market, making it more difficult to capture the attention of your target audience.
  • ...22 more annotations...
  • New cyber security companies are popping up all the time in response to the heightened demand. This can make it hard to stand out in the crowd, and it makes it essential for you to communicate what makes your brand different.
  • you also want to be credible.
  • your potential customers need a significant amount of education to understand what threats they face and what solutions they may need.
  • This is especially true given that CEOs and other C-level executives are not as well versed in information security, which can impact a company’s decision to include cyber security as part of their overall preparedness plan.
  • Though there is plenty of evidence pointing to the necessity of cyber security in protecting valuable data, the truth is that many businesses just don’t prioritize cyber security until it is too late.
  • only one in five, or 22% of those surveyed said that they fully incorporate information security into their strategy and planning.
  • data suggests that cyber security marketers must find ways to create a sense of urgency for potential customers
  • Content marketing can help you build credibility while addressing the major challenge of educating your prospects. In order for your content to be effective,
  • ensure that it is unique.
  • Blogs are great for attracting prospects in every stage of the buyer’s journey. Try to create some evergreen blog content that will be universally relevant
  • Offering downloadable content like e-books and whitepapers is also an excellent way to convert your site traffic into leads that you can later nurture.
  • Another aspect of downloadable content that you’ll need to consider is the landing page.
  • case studies are one of the most important tactics for B2B companies.
  • Email Marketing
  • Downloadable content like e-books, case studies, and reports that provide readers with a more in-depth understanding of important cyber security topics. Links to your most recent blog posts talking about recent attacks or security concerns and those that break down complex cyber security topics for a wider reading audience. Video content that emphasizes the importance of cyber security and communicates the value of your company’s offering. A digest of relevant articles from reputable industry publications that helps readers better understand hot topics in cyber security. Monthly offers and sales promotions like a free trail, which can encourage prospects to sign up.
  • Webinars are a great way for cyber security marketers to connect with bottom-of-the-funnel leads.
  • interactive element.
  • Webinars can sometimes be costly to produce. However, as with other parts of your marketing campaign, there is also an opportunity to repurpose your webinar to get more out of this content.
  • Paid campaigns are great at accomplishing two goals – amplifying your content marketing efforts and getting prospects to arrive at your demo request landing page.
  • Don’t exaggerate your solution’s results.
  • Use data in your messaging. 
  • Create an easy-to-navigate library of premium content. 
  •  
    The Cyber-security Market report has predicted worldwide spending on cyber-security will surpass $1 trillion by 2021. This is a result of annual cyber-attacks costing $9.5 million in global damages. The many solutions on the market require cyber-security services to be innovative on how they market. Cyber security companies want to stand out to customers while still remaining credible. Many businesses are also uneducated and/or don't prioritize cyber-security. The use of blogs and downloadable e-books allow marketers to educate while promoting their product. Cyber security marketers have to make sure they have an easy user-interface, use data in messaging, and don't over exaggerate the capabilities of their products.
Lymaris Collazo

For hotels, COVID-19 has created an operational "perfect storm" | PhocusWire - 0 views

  • As recovery starts in some regions, hotels are reporting dramatic and unexpected spikes in occupancy numbers, swinging from 20% to 80% occupancy and back down to 20% in a matter of days.
  • The guest profile of businesses is changing too in many instances. Many business travel hotels are having to work out how to pivot to attract and profitably service leisure guests in the absence of a business travel market currently.
  • On top of the basic need to have the right amount of staff in place for a highly unpredictable amount and type of guests, hotels also have to process systemic change in the way their operations run to be able to guarantee the care of their staff and their guests. Surgical precision also needs to be applied to cost control.
  • ...8 more annotations...
  • One of the biggest challenges for operations managers and housekeepers alike is in implementing the new cleaning protocols. Extra time needs to be planned per hotel room to make sure that the right processes are followed, and the correct manpower needs to be available to execute the new protocols adequately for the number of rooms in service.
  • Some hotels are also deploying cleaning techniques that require rooms to be left for three hours after spraying, others have a policy of allocating 24 hours per room before another guest can be checked in to ensure there is time to fulfill the new procedures.
  • We found that the average guest departure room cleaning time has increased by around 11% overall. In fact, over half of the hotels we spoke to report an increase in minutes spent cleaning each room of at least 15% or more. Ivaylo Ivanov, senior vice president of hotel operations for Okada Manila, estimates that at his 5-star resort, an additional 25% to 30% time is required to clean each room.
  • Expense control pressures are increasing as the costs of these operations continue to spiral with hotels having to outlay hundreds of thousands of dollars on new cleaning products and protective equipment.
  • With supplementary costs like these to balance against occupancy rates of 20% on average, hotels have to find sophisticated ways to save on costs that won’t compromise the all‐important guest experience.
  • We expected hotels to turn to a reduction in stayover cleans as a key way to balance out the additional time spent cleaning check-out stays. However, our survey found that only 12% of the hotels we have spoken to have actually gone down this route.
  • As a five‐star resort where guests know to expect exemplary service, Ivaylo at the Okada resort just simply does not feel this option is open to them as standard (although, if guests request it, that would of course be accommodated). Indeed, where guests do want stayover cleans, the hotels we surveyed found that cleaning time significantly increases by around 35%.
  • When all the strings of the current environment for operations staff are pulled together, it is easy to see that not only have their jobs fundamentally shifted but that there is a huge amount expected of them. Technology has played a vital role in helping teams to communicate and operate during the lockdown, and it will be even more essential to equip teams with the right tools in this next stage so that hotel operations can be optimized to the maximum and these key members of the team are properly supported.Now is the time to assess each process to gain a full picture of exactly what labor and time is needed to continue to operate at the level guests expect whilst adapting to the regulations of the new normal. Any investment made now to support this essential part of any hotel will pay dividends in terms of lowering staff turnover and increasing guest satisfaction as well as realizing business-critical cost savings.
  •  
    On this article you may learn about the security protocols of cleanliness rooms that hotels had to implement due to Covid-19. This challenges comes with the accompanion of controlling opertional costs and what labor and time is needed to continue to operate at the level guests expect whilst adapting to the regulations of the new normal.
svail001

Understanding the Security Risks of Your Hotel's PMS Data Hosting Environment | By Warr... - 0 views

  • Data security has come under greater scrutiny for all businesses in recent years, with larger fines and penalties being awarded for contemporary data breaches.
  • Choosing the right partner and hosting environment for your property can be complicated, but the property-management system (PMS) selected will play a critical role in securing your confidential data
  • Protecting your guests’ data is equally important as preserving their physical safet
  • ...14 more annotations...
  • There are two components of the puzzle: the booking engine used by hotels, and the actual PMS
  • Understanding how your hotel accesses and stores guest data is key to understanding their liability in relation to that data
  • Hosting your hotel's online booking engine comes with an extensive investment into web server technology
  • work with third parties to host their booking engine off site. However, even if your hotel's data is out of sight, it is a hotel's responsibility to keep their data partners accountable
  • Request information on the hosting facility’s certifications for GDPR, PCA, SOC 2, and others.
  • Forming relationships with your network administrator is key because every partnership in this arena is unique
  • data storage and security for hotels could be mostly automated, or hotels could be expected to manage several processes on their own
  • No matter how a hotel stores its data, operators will always be liable for securing it on some level.
  • Partnerships of any kind also do not absolve hotel operators from managing their local network
  • data services have tenants, like the housing market, and it pays to know if you have neighbors or not. Businesses have the option to invest in either a dedicated or open hosting environment,
  • Dedicated hosts allow for updates to roll out in coordination with operators’ decisions, keeping it autonomous and allowing for proper scheduling and preparatio
  • The other option, where multiple businesses share a single server host and single application instance, is a more hands-off proposition
  • but when an update is rolled out by the host it is done to every company on the shared server environment, whether your property is prepared for it or not. Surprise updates such as these can potentially impact operations, or other aspects of your business.
  • The hosting environment for your PMS and guests’ data should provide you with confidence through open and clear communication, vendor commitment and choice of options that best suit your specific independent needs
  •  
    This article discusses the important issue of data security especially when it comes to a hotel's PMS. It goes into two areas of particular vulnerability: the booking engine used by hotels and the actual PMS. By hosting a 3rd party booking engine off site, it is still the responsibility of the hotel to secure and keep guests' date secure. They need to ensure that their partners are adhering to proper compliance and rolling updates for security. The second area of focus is the PMS itself and how it is hosted: whether locally or through a cloud based system. Regardless of the location of the host, data security is the responsibility of the hotel.
nashalsiddiqi

How will technology impact the efficiency and sustainability of waste management? - 0 views

  • How will technology impact the efficiency and sustainability of waste management?
  • This is the way waste management has always been. New York’s first waste management was an attempt to clean the streets of the thousands of tonnes of horse manure dumped on them every day.
  • The advent of packaging, plastics and electrical/electronic products has changed the way waste managers work. Yet, in 70% of the world, the old pick up and dump model continues sadly unchanged with disastrous consequences, such as oceans being full of plastics. But elsewhere waste management is now a sophisticated, technically and socially complex industry.
  • ...10 more annotations...
  • Technology has enabled waste management to ensure environmental and human health protection while at the same time handling complex materials, increasing recycling, producing energy and virtually eliminating landfills in some countries.
  • Robotics are already widely present in sorting material facilities
  • The internet allows continuous real-time tracking of waste across countries
  • Hydraulic collection systems are increasingly being introduced in new buildings to avoid bins on the road.
  • Plant management, emission monitoring, chemical/biological parameters within plants
  • These new technologies are creating vast amounts of data. The data allows us to understand the movement not just of waste but of people – how they behave and what products and materials they are buying and will turn into waste.
  • predict the future and plan waste collection, the location of bins on the streets, the amount of plant we need, with some anticipation.
  • It also allows producers of waste to intervene to reduce their waste outputs
  • Add to this the use of artificial intelligence and blockchain computing – technologies that allow the multiplication of the access and transmission of intelligence and its automation. How does this work in practice?
  • First, data collection will be faster and simpler; then automated trend and performance analysis allows the user to see anomalies immediately; finally, this informs employee behaviour and decisions and allows immediate corrective actions.
  •  
    the article suggests the different ways technology contributes into solving one of the issues production companies face which is managing waste. by suggesting different aspects to limit the negative outcomes of the production also to help in overcoming the challenges in the area. the article also emphasize the importance of data collection and utilization to enhance the efficiency in the industry.
nashalsiddiqi

Why is it important to keep my IT systems up to date? - 0 views

  • software upgrades are essential for continued operation. On the technical side of things, these upgrades provide fixes for known issues, provide new enhanced features, and often resolve and fix major security flaws or other types of flaws inside of software that could put your company and your company’s data at risk.
  • very important to keep track of updates and test them whenever possible before deploying them to a production environment. On some complicated infrastructures, applying something as small as a small security fix could bring down multiple integrated Line of Business applications. In an event like this it could cause huge problems!
  • ignoring security updates could leave a huge security hole that could be exploited by a virus, or malicious piece of software and infect many of your systems.
  • ...7 more annotations...
  • is when it comes time to do larger upgrades, or migrate systems to new servers, the migration/implementation time could be multiplied 2-10 times just because you haven’t kept your systems up to date.
  • In situations where you do have a valid good warranty from a recommended vendor, you can often have hardware replaced under warranty by the next business day, minimizing downtime.
  • Equipment Age – They need to purchase new equipment, since replacement parts aren’t available anymore, and the equipment’s warranty has expired.
  • Consumer Grade Equipment – Some IT Solution providers, and/or IT staff feel they can build their own servers, or purchase off-the-shelf consumer grade equipment for business use.
  • Vendor Warranty – We are called in to resolve an issue on a new server environment, but it turns out the equipment just came off warranty after 3 months.
  • Security and critical updates need to be applied urgently when possible. Upgrades or updates that increase features, functionalities, and correct software flaws are also important, but not as important as security/critical updates.
  • Hardware should be upgraded when either the equipment is coming off warranty, or when you need to upgrade for performance/capacity reasons.
  •  
    the article emphasizes the importance of conducting constant updates and upgrades on software and hardware, as it will help to protect the company data and systems from any possible hacks or viruses or data loses.
kmill139

Big Brother is watching: Chinese city with 2.6m cameras is world's most heavily surveil... - 0 views

  • The city’s surveillance system scans facial features of people on the streets from frames of video footage in real time, creating a virtual map of the face. It can then match this information against scanned faces of suspects in a police database. If there is a match that passes a preset threshold, typically 60% or higher, the system immediately notifies officers. Three days later the police captured the man, who eventually admitted that he was the suspect.
  • With 2.58m cameras covering 15.35 million people – equal to one camera for every six residents – Chongqing has more surveillance cameras than any other city in the world for its population, beating even Beijing, Shanghai and tech hub Shenzhen.
    • kmill139
       
      In the near future you will be able to find camera anywhere you go
  • Eight of the 10 most surveilled cities in the analysis are in China. London ranked sixth with 627,707 cameras covering 9 million residents and Atlanta, Georgia, came 10th with 7,800 cameras for 501,178 people.
  • ...11 more annotations...
  • Many crimes committed in a certain area of Chongqing were committed by non-residents, so facial recognition cameras were seen as a way to combat this.
  • But critics warn such widespread surveillance violates internationally guaranteed rights to privacy. To meet international privacy standards enshrined in the International Covenant on Civil and Political Rights, both collection and use of biometric data should be limited to people found to be involved in wrongdoing, and not broad populations who have no specific link to crime. Individuals should have the right to know what biometric data the government holds on them. China’s automated facial recognition systems violate those standards.
  • “These systems are being developed and implemented without meaningful privacy protections against state surveillance. The depth, breadth and intrusiveness of the Chinese government’s mass surveillance on its citizens may be unprecedented in modern history.”
  • Cities elsewhere may not be too far behind China’s mass surveillance.
  • media access control address of users’ smartphone devices, a request sent when a device is searching for a wifi connection, to track their travel journeys precisely. It was only after the media raised awareness of the project that TfL widely informed its passengers.
  • “With the rise of things like facial recognition, that is why we need new legislation that decides what is in the public’s interest and the legal structure within which they can be used. We shouldn’t drift there by accident.”
  • And part of that is building trust with the community based on good community information, not on Big Brother technology.”
  • Since then, two more Californian cities, Oakland and Berkeley, have also passed bans on all government use of facial recognition technology. Somerville, Massachusetts, passed a similar law this summer.
  • Some people support facial recognition on the basis that technology has always driven change and is a force for good if used responsibly and proportionately.
  • Omanovic argues that live facial recognition fundamentally threatens free societies. “It might start with the monitoring of just a few thousand people but it definitely won’t end there,” says Omanovic. “Authorities need to permanently ban its roll out now before it’s too late.”
  • “Singapore has plans to install 100,000 facial-recognition cameras on lampposts, Chicago police have asked for 30,000 more, and Moscow intends to have 174,000 by the end of this year.”
  •  
    Super important and relevant article about how big brother is watching us
xrive007

Cyberattack hits world's largest meat supplier - 0 views

  • It might be days before production resumes after an “organized cybersecurity attack” affected IT systems in North America and Australia
  • The world's largest beef supplier has been hit with a ransomware attack, threatening some of the U.S. meat supply.
  • The hack came less than four weeks after a similar one by Russian criminals against Colonial Pipeline
  • ...16 more annotations...
  • JBS, one of the world's largest international meat processors, was hacked
  • forcing the company to take systems offline and stop work
  • 11 beef processing facilities in Australia and 26 chicken processing plants in the U.S
  • The company told the White House on Sunday that it was a ransomware attack,
  • JBS notified the administration that the ransom demand came from a criminal organization, likely based in Russia.
  • Ransomware, an extremely lucrative type of cybercrime, is malicious software that lets hackers encrypt a victim's files and demand a ransom to make them functional again.
  • he hackers will steal and threaten to publish those files if their demands aren't met.
  • Ransomware attacks have grown rapidly in recent years.
  • Criminal hackers,
  • often based countries like Russia where they are largely protected from U.S. law enforcement
  • have targeted practically every major industry to shake down victims for payment.
  • about 40 food and beverage companies around the world have had confirmed ransomware attacks since May 2020.
  • Colonial's hackers, an established ransomware gang called DarkSide, shut down its website amid international attention from that attack, but not before receiving a $4.4 million payment from Colonial.
  • regularly hit manufacturers, school systems and city governments.
  • ransomware attack had already affected the cattle market.
  • If this goes beyond a week, you start to really worry about these animals building up on farm sites where they just don't have the capacity to hold them
  •  
    An example of a cyber attack or ransomware, in a manufacturer. Shows some effects of a ransomware and what a consumer may experience.
mrodr1442

The Future of Hotel Technology and Touchless Hospitality - 1 views

http://sco.lt/82nB4K Its amazing the amount of advanced technology has changed the hotel industry over the years with touchless being a top notch service for many hotel guests. You can walk into a ...

hospitality hotel travel Tech

started by mrodr1442 on 25 Aug 21 no follow-up yet
nashalsiddiqi

What are the three big technology issues for the hotel industry? | PhocusWire - 0 views

  • The fragmented nature and location of hotel systems means a guest’s credit card number could exist in multiple systems in formats of varying security in locations of varying security.
    • kmira026
       
      1st technology issue for hotel industry
  • HTNG has set up a workgroup that will a framework that will enable hotels to concentrate the storage of sensitive card data in a single system, managed securely by a vendor or the hotel company.
    • kmira026
       
      Solution for 1st technology issue
    • nashalsiddiqi
       
      is this enough?
  • it has become critical for hotels to appear correctly and accurately in search results, as search engine sites have essentially become the gateway to travel research and inspiration.
    • kmira026
       
      2nd technology issue is Unique Global Identification Numbers. Something as small as a incorrect address can cause a problem
  • ...18 more annotations...
  • In both Europe and the US, regulations are being released and revised to provide support to guests with disabilities.
  • With the increase in electronic distribution of hotel information and transactions, hotels are working to provide better information and service to guests with disabilities.
    • torte003
       
      The three main technology issues hotels are facing are PCI, ID numbers , and support for best with disabilities.
    • torte003
       
      PCI is a main security threat that they face. Having a hotels cc system hacked and all their guest information stolen is an extreme nightmare. They have tasks forces that help educate hotels on how to protect and learn more about the procedures to keep that secure.
  • I can hear some of you now – what good can possibly come from creating an ‘association of associations’? Aren’t we just creating more overhead, more cost and more bureaucracy? In a word, no.
  • From my own perspective
  • I hate wasting our scarce
  • resources, and worse, wasting the resources of our members who volunteer their time to work for us
  • Other council member organization initiatives include a white paper authored by AH&LA, a payment technologies committee established by HEDNA, and the support by OpenTravel of needed XML specification changes as required by the industry.
  • thousands of companies worldwide provide hundreds of software applications to help hotels and hotel companies manage operations to provide better guest service.
  • three key technology issues that are having, and will continue to have, a direct strategic impact on the hospitality industry:
  • Search engine optimization is a great thin
  • PCI (payment card industry) complianceUnique identification numbers for hotelsSupport for guests with disabilities
  • ‘holy grail’
    • torte003
       
      Having wrong information about your hotel or business can be such a negative impact on business. With everyone now on google or yelp having the right information is crucial.
  • y company has become critically important for the financial stability and market credibility of the hospitality industry.Members of the HTSIC have addressed this issue in a coordinated
    • vanessavioli
       
      Cyber security is almost equal to climate change in the impact on the industry. As we move into being a cashless society, keeping guests information private is integral to the continued growth of the industry.
  • Initiatives specific to distribution include the creation of standard room definitions and descriptions, guaranteeing accessible guest rooms and removing the accessible guest room from inventory when booked. HEDNA has worked on creating this vocabulary, and OpenTravel has revised its hotel schema, annotations and code list to reflect these changes.
    • vanessavioli
       
      This is an extremely important issue for the industry. Creating an industry standard vocabulary to ensure that guests with disabilities receive the specific room and accommodations they need is a game-changer. The ease of mind that it would create for those customers is priceless.
  • And our biggest strength is our commitment to work together, to eliminate redundant work or conflicting positions, to be transparent and open in our dealings with each other, and to address the most important technological needs of the hospitality industry.
    • vanessavioli
       
      With the ease of current technology, concerns about many of the bureaucratic aspects of something like this can be quickly done or even potentially eliminated.
xrive007

Robots Replacing Humans Leading to Big Job Losses: Report | PEOPLE.com - 1 views

  • Rapid Rise in Robots Replacing Humans at Work Leading to Big Job Losses in Next 20 Years: Report
  • whirring robotic machine has replaced baristas
  • these non-human replacements
  • ...12 more annotations...
  • are rapidly changing the workplace
  • expected to erase or greatly change half of all jobs within the next 20 years,
  • This,
  • may lead to a worsening of social and economic tensions
  • Some of the robotic changes are already in plain view worldwid
  • automated cooking pots have replaced chefs
  • robots have replaced bartenders and waiters
  • Those who will be particularly affected by changes in the way we work
  • are low-skilled, part-timers in the gig-economy or the young
  • tremendous impact machines have had on job loss.
  • The OECD Employment Outlook does not envisage a jobless future. But it does foresee major challenges for the future of work
  • An antidote to this, suggests the OECD, is more training and governments increasing worker protections
  •  
    This article is about how far we are getting with technology in the restaurant business. It shows some examples of places that have acquired some of these innovative technologies.
dlevine4195

Normal 2.0: how a tech-first response is shaping the travel & hospitality sector | Hote... - 2 views

  • launch of the iPhone in 2007. While that’s not a hospitality-specific development, it changed everything about the way people want to travel.
  • billions of people could make restaurant reservations from their pockets. They could leave their room and have an interactive map through a new city, with the ability to keep in touch with their family and coordinate with friends.
  • it’s incredibly advantageous for hoteliers and travel professionals to keep abreast of the technological advancements that will set higher standards for the new hospitality normal.
  • ...11 more annotations...
  • , virtual ID verifications can be built into booking platforms, integrated apps can grant access to digital room keys and enhanced biometric technologies have the power to supplement (or eventually replace) the traditionally awful pre-flight screening process.
  • many travel and hospitality professionals are investing in VR-based marketing to spike interest in their offerings.
  • VR tours are being offered all around the world to spike interest in sights and tourist destinations, making people want to see the sights for themselves
  • VR marketing will soon emerge as the smartest strategy for connecting with consumers; high-budget commercial spend and other digital marketing tactics will be rendered obsolete when any prospective traveler could put on a headset and instantly be transported to the shore of a beach.
  • hoteliers and vacation destination economies invested in virtual reality offerings to extend their experiences beyond the travel restrictions, offering travelers a temporary at-home substitute.
  • It will diminish both consumer wait times and consumer-staff interactions, allowing professionals to reserve their time and focus for more complex guest and traveler needs.
  • investments into biotech need to be paired with cybersecurity and infrastructure that protects a guest’s identit
  • Today, guests and travelers understand quality in terms of fast response times, consistency across channels, and intuitive, self-directed use.
  • eople show a preference to manage smaller tasks on their own; a study by Zebra Global Hospitality showed 70% of guests preferred a smartphone check-in for efficiency and speed.
  • Airline safety once meant extensive processes at TSA, but consumers and professionals are quickly coming to trust the powers of biotechnology, changing the way we think about screening.
  • looking for that service in different ways—on their phones, at their fingertips, and behind the scenes.
lorenismora21

Cloud Computing: Travel and Tourism Trends - 0 views

This article talks about how beneficial it can be to have a cloud based model for travel companies. Cloud solutions offers flexibility, scalability, remote access to services and can reduce operati...

https:__www.hotelmanagement-network.com_features_cloud-computing-travel-and-tourism-trends_

started by lorenismora21 on 01 Sep 21 no follow-up yet
rhera004

What is the future of cloud computing ? - 0 views

    • rhera004
       
      Internet v. Web Internet= full system Web= Application in that system. Ex. A web browser
  • In simple words, cloud computing is the delivery of computing services like servers, storage, analytics, networks, databases, and software over the internet.
  • highly scalable
  • ...30 more annotations...
  • cale the services depending on the business requirements.
  • 90% by 2024.
  • number is expected to
  • reach
  • low-cost infrastructure for enterprise solutions combined with high-value services
  • 1] Higher Security
  • One of the key aspects in the future of cloud computing is higher security.
  • risks involved and have started taking measures to be GDPR compliant
  • EU’s General Data Protection Regulation (GDPR
  • In 2018
  • recognizing the security
  • multi cloud or hybrid cloud IT environments.
  • subjects have been artificial intelligence, machine learning and the Internet of Things.
  • most discussed
  • This concept is evolving but has raised concerns about data privacy.
  • This has led to the emergence of the new term “IoT security
    • rhera004
       
      Interesting topic for me. Everyone in the modern world is generally dialed in 90% of their time. IoT is also something to consider...
  • the cost of data centers will reduce in the future.
    • rhera004
       
      Is this really as safe as they claim it to be...?
  • PaaS, SaaS, and websites to make them more responsive and user-friendly.
    • rhera004
       
      PaaS- Platform as a Service SaaS- Software as a service
  • inception in 1999
  • s employees
  • ccessi
  • By integrating cloud solutions with business practices a business can ensure usability
  • bility for i
    • rhera004
       
      While this article is discussing the future of cloud Computing please note it is written by a software/ cloud service provider.
  • s
  • Cloud computing is the process of delivering IT resources on-demand over the Internet
  • and a
isabelladlp

Hospitality Marketing: 16 Must-Know Upcoming Trends for 2021 - 0 views

  • Hospitality marketing is centred on thinking about the business in terms of customer needs and their satisfaction.
  • If you want to attract more customers to your hotel or travel business, you need to efficiently advertise on different digital channels and be where your niche audience is.
  • One of the most significant hospitality trends to be aware of in the wake of COVID is the importance of highlighting safety procedures, hygiene policies and other decisions intended to protect your customers.
  • ...10 more annotations...
  • However, due to the restrictions on mass gatherings and increased focus on remote work and video calling, business travel has been hit especially hard by COVID and some travel companies are placing a renewed focus on leisure
  • Make sure your destination or property is visible on distribution and communication channels that leisure customers use and highlight associated facilities.
  • However, with COVID reducing international travel, one of the biggest hospitality marketing trends involves placing a renewed focus on local custom instead.
  • Some companies in the industry are having success through offering food delivery as an experience, combining well-presented food with add-ons, such as candles, music playlists or other freebies.
  • Which demographics are still interested and making bookings, and which have fallen away? Which market segments are growing and which are taking longer to return? Is there any relevant geographical data to consider? Once you have insights into how customers are really behaving, you can adjust your hospitality marketing efforts accordingly.
  • While many businesses compete based on pricing, the reality is that many customers are happy to pay more for guaranteed quality, excellent service or a unique experience. Think about some of the things you can throw into your offering, in order to make it stand out from what rivals are selling.
  • These bots allow for rapid responses to customer questions, regardless of staff availability, and can provide support for multiple languages too.
  • This technology can be used during the booking stage, in order to offer support and encourage completion of bookings. Bots may also be able to up-sell and cross-sell, potentially helping your business to maximise revenue.
  • n fact, this marketing trend could soon eliminate the need for Internet users to press buttons or type their search queries online. Hotel guests can book a hotel room via their smartphone by just speaking to the device.
  • y returns and a steady stream of returning clients, you must compile analytics from online customer testimonials on review websites.
  •  
    Marketing has definitely changed to online marketing. No more are we printing flyers and putting them in mail boxes. This article gives a list of trends that will help the hospitality industry in 2020. All of them are eMarketing strategies that will help any hospitality business creating a marketing plan for 2020.
cingram21

How proximity engagement turbo-charges QSR loyalty| Q | QSR Web - 0 views

    • cingram21
       
      This article does a nice job of explaining how to effectively utilize proximity marketing to grow loyalty. It discusses the importance of understanding privacy and how important it is to monitor app downloads and deletions to determine if the strategy is aligned with guest expectations.
  • That's the beauty of proximity engagement. Not to be confused with location-based marketing, proximity engagement is about engaging your customer with a message they will actually want, not simply sending them the message you want them to get.
  • The aforementioned study also found that only 39% of respondents said they would keep an app for more than six months, with 28% admitting they deleted an app after using it. So, if offering an engaging app is the way to your customers' hearts, you need to figure out how to get them to keep yours on their phones.
  • ...4 more annotations...
  • This is happening despite the fact that most restaurant leaders and marketers know consumers don't want to be shouted at or nudged. In fact, when the signal-to-noise ratio gets too weak, consumers will not feel the value and are much more likely to delete the app.
  • There's an increasing amount of pressure to restrict the sharing and use of consumer data without consumers' explicit permission, which is fantastic from a consumer protection and privacy perspective.
  • Stanford University's Behavior Design Lab founder, BJ Fogg — considered the father of behavior design — explains that it takes motivation, ability and a prompt to converge at the same time for a behavior to happen.
  • When a customer is nearby, their ability to patronize your restaurant is high. When it's around mealtime, or if it's been a couple weeks since that customer has had their favorite dish at your store, their motivation to act is also likely high. When both of those criteria are aligned, then the probability they will respond to the right prompt with action is high.
ldevaul

How the travel industry can fight back against cyberthreats | SmartBrief - 1 views

  • Travel and hospitality businesses have become lucrative targets in recent years for cybercriminals who have stolen from the industries in attacks that often take more than half a year to identify.
  • In the past three years alone, the hotel industry has faced 13 serious attacks, according to an IntSights study.
  • The travel and leisure sectors suffered a 155.9% year-over-year rise in suspected online fraud attempts worldwide in the second quarter, according to a TransUnion study, compared with a 16.5% increase in overall alleged intrusions.
  • ...21 more annotations...
  • The hotel industry attracts cybercriminals because it handles so many financial transactions in so many countries.
  • The top threat to hotels is phishing, a scam in which hotel guests may receive fake phone calls claiming to be from the front desk. The caller could claim that there is an issue with the credit card on file and that they need to re-verify the payment method. 
  • DarkHotel hacks are another significant threat. These target travelers via hotel Wi-Fi. Digital certificates are sent to guests, like a familiar adobe update, which will retrieve sensitive information. Hotel chains are combating these hacks by suggesting that guests use a virtual private network.
  • Malware (malicious software) is something criminals email employees, under the guise of the attachment or link looking innocent or legitimate. But when the user opens the file or clicks on the link, their system (and more) can be hacked into by the criminal.
  • IT department should routinely update operating systems and back up data and files, and every employee should double-check sources when asked for software administrative permissions. Also, strong firewalls can limit bad traffic and provide security. 
  • Software and hardware can help prevent breaches, but employee training is also an essential part of any hotel’s cybersecurity.
  • In 2018, a Marriott reservation system was hacked. More than 500 million customer records, including credit card information and passport numbers, were stolen. The company said the hack went back four years prior to the discovery and, when it was noticed, the company started using computer and mobile device monitoring software.
  • “Guests can enroll in a service called WebWatcher, which monitors the sites where personal information may be shared and alerts guests if evidence of their personal data is found,”
  • Hotels are not alone in being targeted by cybercriminals: The airline industry has faced serious cyberattacks as well, and many airlines still aren’t equipped to handle them.
  • only around 35% of airlines and 30% of airports are prepared for cyberattacks.
  • "The proliferated effect of the attack on SITA is yet another example of how vulnerable organizations can be solely on the basis of their connections to third-party vendors,"
  • The aviation industry faces dangers such as ransomware and distributed-denial-of-service attacks. Following the SITA attack, HackerOne solutions architect Shlomie Liberow stressed that airlines need to prepare for the worst. 
  • traditional enterprises like airlines have always been an attractive target since few are digital-first businesses, and therefore have relied on legacy software, which is more likely to be out-of-date or have existing vulnerabilities that can be exploited."
  • The airline industry needs to keep third-party vendors in check when it comes to protecting information. Given the high stakes involved, experts suggest that blind trust is not an option. 
  • “You simply cannot know whether your third parties meet your company’s security controls and risk appetite until you’ve completed a full vendor security assessment on them,
  • It’s important to note that the best practice is not a ‘one-and-done’ activity, but through real-time, continuous monitoring.”
  • In 2015, hackers targeted Polish airline LOT’s ground operations system, affecting 1,400 passengers. The hackers made it impossible to create flight plans and flights. It was the first attack of its kind, and it caused concern about cyberattacks one day remotely taking control of planes.
  • To address the threat, the standard advice is to back up and store data in multiple places, including off your physical premises, and have one copy of it be offline
  • Multifactor authentication and long, complicated passwords will take longer to crack. Updating and patching systems regularly helps companies avoid being victimized when a new exploit is discovered.
  • Treating cybersecurity as a companywide concern, not an IT concern, encourages each employee to take ownership of their actions and knowledge and to seek help proactively instead of making an “innocent” mistake that costs the company millions of dollars.
  • Finally, companies should avoid simply throwing money at the problem: Not all cybersecurity solutions work together, which wastes money and increases the risk of a breach.
  •  
    This article discusses ways that the travel industry can combat cyberthreats. The main cyber concern for hotels' is phishing, which is a scam that collects credit card information by pretending to be apart of a hotel's front desk staff. The article mentions that IT departments should do routinely updates to operating systems and back up data and files. Employees should also be trained to help prevent data breaches. The author briefly touched on what to do when your hotel system is hacked and even dives into how the airline industry is still very unequipped to handle cyberattacks and threats. This is a great read to learn how to keep up with best security practices in the hospitality and tourism industry.
« First ‹ Previous 441 - 460 of 494 Next › Last »
Showing 20 items per page