Skip to main content

Home/ Hospitality Technology/ Group items tagged remote

Rss Feed Group items tagged

dstro007

Point-of-Sale Attacks Leverage Weak Remote Security and Passwords - Blog - Duo Security - 0 views

  • Weak remote security and passwords contribute to 94 percent of point-of-sale (PoS) breaches
  • The report found that much of the food and beverage and hospitality compromises were due to the dependence on remote access software to remotely manage locations and payment systems.
  • But many times, remote access software were deployed with weak or default credentials, making them a prime target for criminals.
  • ...4 more annotations...
  • In a breakdown of types of IT environments most frequently compromised, POS systems and assets were associated with 95 percent of breaches in the food and beverage industry
  • One example is the breach of Eataly,
  • The company reported that their Manhattan retail location was hacked and malware was installed to capture payment card transaction data.
  • The conclusion is, remote access credentials appear to be a common theme among most POS breach cases, which calls for a specific technical approach to eliminating this risk and the liability of weak authentication security for remote application logins.
  •  
    In a report generated by Trustwave Global Security shows that about 94% of POS hacks are contributed by weak remote access. The hospitality industry seems to have taken the hardest hit. We know of the grueling schedules that come with working in our industry and how we all can't be there seven days a week. So when management are in the comfort of their relaxation area and remotely access the POS systems, they seem to be leaving the doors open for hackers to enter, as well. "In a breakdown of types of IT environments most frequently compromised, POS systems and assets were associated with 95 percent of breaches in the food and beverage industry" (Pham). One popular hospitality establishment that has reported a breach is the New York location of Eataly. The thought process behind why these hacks are happening has not been figured out yet, but the idea has been tossed around that it is because of the credentials used to remote access. The temporary solution is to create a double layer security system, also known as two-factor authentication. By doing it this way, you can log in using your credentials, but then have a second login that needs to be verified by way of sending codes and authentications to technologies that you would have in your possession (cell phones, emails, etc.) so no one else can access that information.
Manali Rabari

POS Hackers Sentenced for Multi-Million Dollar Payment Card Data Theft | News | Hospita... - 0 views

  • “The Subway case is a clear indication that privileged and administrative accounts are increasingly targeted and used by criminals to steal sensitive information,”
  • “In this case, the attackers were able to simply do an Internet search for remote desktop applications that were used by the restaurants, and through simple password cracking techniques, they were able to gain administrative access to the systems.  This enabled them to easily steal sensitive financial information from unsuspecting customers.”
  • Two Romanian nationals have plead guilty for participating in an international, multimillion-dollar scheme to remotely hack into and steal payment card data from hundreds of U.S. merchants’ computers, including a great number of Subway restaurants. Federal prosecutors noted that the conspiracies involved more than 146,000 compromised cards and more than $10 million in losses.
  • ...1 more annotation...
  • Bosnian continues, “The reality is that anyone with an Internet connection can search for, identify and target  remote applications that businesses rely on – the problem facing the industry is that there is not sufficient security and protection around the entry points to these applications. Once inside, attackers have free reign on the network. If you examine the list of the recent, high-profile data breaches that have plagued organizations, including Global Payments, the U.S. Chamber of Commerce, the Utah healthcare breach, etc…, the common denominator is that the attackers focused on gaining access to the privileged or administrative accounts.” 
  •  
    According to the article, two Romanian nationals have plead guilty for participating in an international, multimillion-dollar scheme to remotely hack into and steal payment card data from hundreds of U.S. merchants' computers, including a great number of Subway restaurants. The reality is that anyone with an Internet connection can search for, identify and target remote applications that businesses rely on. This case is a warning to operators utilizing POS systems to shore up their security by taking steps to make their accounts more difficult to breach and therefore less attractive hackers.
  •  
    This article discusses the security issues with restaurants using remote desktop applications that are easily accessed by hackers trying to steal stored credit card information. The relative simplicity in which these hackers were able to steal the numbers should pose a real concern for restaurant owners in making sure their systems are properly secure from theft. They were able to crack simple password protected applications to gain access to private information. These remote applications used by restaurants are a not provided with enough security and therefore are easy targets for hackers.
Le Chai

Technology helps hoteliers manage remotely - 0 views

  • While GMs spend most of their time on property, district managers often monitor the three key performance metrics in real time for multiple properties.
  • Youngblood said remote technology gives him the opportunity to be more flexible.
  • It’s owners rather than managers looking to view reports away from the property. While management company Chesapeake Hospitality may hold the occasional meeting to update its owners, Joseph Smith, executive VP, said owners could potentially have five or six properties they oversee.
  • ...3 more annotations...
  • Youngblood said he uses a mobile app from Revinate to monitor his hotel’s social media engagement. He said he receives alerts anytime a new review is posted about the Hilton, whether he’s “on the floors working with my team or at my kid’s basketball game on the weekend.”
  • Smith said when communications were handwritten—and even with email—there is hard-copy evidence and a paper trail. With text, he said, printing is just not convenient and there are times when hoteliers put their phone away, forgetting to take action.
  • “Remote access allows people to work smarter and really being able to focus on the highest priority items more timely,” Weigel said. “It also allows for greater efficiency as the easy things can be done quickly. It allows for more flexibility and greater job satisfaction.”
  •  
    This article describes the hotel owners using the technology manage the hotels remotely. It shows several advantages, for example, convenience and  flexible.  However, some challenges also brought by the mobility. It needs time to take actions when using the remote technology and more private time are taken away from the managers. 
Xueling Wang

Hotels Benefit from Remote Network Monitoring | Hotel Wifi Blog - 0 views

  •  
    Since few hotel chains can afford a professional staff to monitor the entire computer network and their guests have little tolerance for slow internet services, remote monitoring technology coming out to allow specialists to evaluate every network component and make changes. Reports are provided from the remote monitoring services at regular intervals. Changes made to the configuration and traffic routing will allow the hotel executives to see the many services that are required to run the network at optimal levels. Recommended upgrades can be conducted before the network performance degrades. 
Qianlin Wang

Data Security Basics: Five Security Issues All Hotel Operators Need to Know | hospitali... - 0 views

  • This article looks at the top five issues facing hotel operators and what actionable steps can be taken to decrease the likelihood that your business will be stung by data thieves.
  • Franchise operators need to be aware, however, that an improperly configured RMA is vulnerable to data compromise attack by hackers. 
  • Transaction volume, brand recognition and the potential for sensitive data retention are all factors that make hotels (particularly franchise networks) juicy targets for hackers seeking to exploit insecure networks via the Internet. 
  • ...3 more annotations...
  • Hotel operators need to know that passwords, designed to keep criminals out, can also be a vulnerability in the absence of proper controls
  • Thanks to wireless networks, guests can speed though the check-in process, expedite valet parking and send room service orders directly to the kitchen.  At the same time, hotel operators should recognize that criminals can leverage improperly secured wireless networks to steal cardholder data and should implement strategies to thwart these efforts. 
  • Despite all best efforts, data compromise events can occur and every hotel operator should have a plan in place. Prompt action must be taken by hotels or restaurants that have experienced a suspected or confirmed security breach to help prevent additional exposure of cardholder data and ensure compliance with the data security requirements. 
  •  
    The article discusses five issues that hotel operations are facing, and how to decrease these issues in regards to data thieves. The first security issue discussed is "Remote Access", the article states "Many hotel operators and franchisors use remote management applications (RMAs)". This enable easy access to manage multiple locations downloads; conduct sales polls, and other systems within multiple companies. A advices to remote control issues are to change vendor default settings, in which you can create unique user IDs and complex passwords. Another advice is to "Configure the RMA", in which users are only allowed to connect to known MAC/IP. I personally don't think that creating a unique ID or account password may solve this issue, but allowing connection capability to a set IP/MAC is a wise intake. Although being able to just connect to a set MAC, will cause a limit on where and when you connect. The second security issue is "Network Security", many transaction volumes are being exposed, brand recognition as well; and that attract hackers. In order to reduce this problem, it is suggested that companies need to install and maintain a fire wall at all time. I agree with this other suggestion which is to Use outside resources to help identify new security vulnerabilities. This is great, because a company will be able to receive an outside outlook in regards to security. The last three issues that are on this list are: Password Management, Wireless Security, and Incident Response Plan. Overall it's evident that any system that has a password requirement is causing a major attraction towards security thieves. The suggestions within this article are great, but from my observation; many companies will have to put in time to track and monitor their systems. Systems can't allow to be left open without monitoring, and the internet is a lead way to all this, so any system that requires the internet must be monitored, and protected.
  •  
    Technology enables service. That's the idea, anyway. In the hotel industry, thousands of companies worldwide provide hundreds of software applications to help hotels and hotel companies manage operations to provide better guest service. However, the hospitality industry continues to find itself targeted for damaging data compromise events by hackers. There are some good ways to decrease the attack of hackers. For example, Remote Access, many hotel operators and franchisors use remote management applications (RMAs).  Their ease of use in managing multiple locations makes them ideally suited to disseminate business downloads, conduct sales polls or survey inventory. RMAs are often packaged from vendors with default or blank passwords. Creating unique user IDs and complex passwords can reduce the risk of data compromise and help facilitate compliance with the Payment Card Industry Data Security Standards (PCI DSS). Another example is about Network Security, transaction volume, brand recognition and the potential for sensitive data retention are all factors that make hotels (particularly franchise networks) juicy targets for hackers seeking to exploit insecure networks via the Internet. The hotel can install and maintain a firewall at all times.  Disabling a firewall can put a business at heightened risk of Internet attacks and potential system compromise.
blevi022

Horizon Properties Group Maintains Business Continuity with Aptech's PVNG During CV19 - 0 views

  • When we deployed Aptech’s PVNG Enterprise Accounting this February we did not plan for a pandemic, but PVNG has been instrumental in our business continuity because now we can oversee financial performance and effectively manage operations remotely,” said Joshua M. Morgan, CHTP, director of technology and infrastructure for Horizon Properties Group, LLC.
  • Horizon Hospitality LLC specializes in hotel ownership, partner relationships, and hotel management services. Its portfolio includes Hilton, Marriott, and independent properties.
  • PVNG is an enterprise hotel accounting software financial system that supports one property or large multi-brand, multi-property portfolios. It uses the most current technology platform incorporating AP, GL, A/R, statistics, financials, and bank reconciliation with easy to use browser navigation. Aptech is an IBM Premier Solution Provider and Prophix Premier Business Partner offering web-enabled business intelligence, budgeting, and hotel accounting software
  • ...5 more annotations...
  • PVNG lets us remotely pay our vendors and coordinate the A/P workflow with our GMs. Our VP looks at all payments and invoices personally and can approve them remotely on her tablet from wherever she is. Remote cloud financial management was a major factor in our PVNG decision.
  • PVNG also lets us compare Hilton’s property reports with Horizon Hospitality’s budgeting and expense data
  • Our executive team works late and travels, and PVNG lets them oversee operations wherever they are. Even with CV19 taking place, PVNG lets our executive team work more efficiently to serve our properties and investors.”
  • Aptech VP Cam Troutman said, “Horizon Hospitality’s team is doing a great job of leveraging mobile technology to operate its properties during CV19’s impact on business. Aptech is happy to support the creative management processes Horizon implemented with PVNG. We are proud of how Horizon is handling the current issue.”
  • When we deployed Aptech’s PVNG Enterprise Accounting this February we did not plan for a pandemic, but PVNG has been instrumental in our business continuity because now we can oversee financial performance and effectively manage operations remotely
  •  
    Horizon properties had been looking to get a remote accounting system for 3 years and deployed Aptech's PVNG Enterprise Accounting system this February prior to planning for a pandemic but have become very useful for business continuity during COVID 19 by allowing operations to be managed remotely.
frank rodriguez

Hospitality Industry Hit Hardest By Hacks - Dark Reading - 1 views

  • Trustwave report on data breach investigations shows hotels were breached more than financial institutions last year, and nearly all attacks were after payment-card data
  • not surprisingly, a whopping 98 percent of targeted data was payment card information
  • Nicholas Percoco, senior vice president of Trustwave's SpiderLabs, announced at Black Hat DC this week these and other findings the company compiled in 218 data breach investigations in organizations across 24 countries. Financial services companies accounted for about 19 percent of the breaches, but that was far fewer than in the hospitality industry, where 38 percent of all breaches took place
  • ...1 more annotation...
  • Percoco outlined the three main steps in a typical data breach and how attackers mostly operate at each level: initial entry, data harvesting, and exfiltration.
  •  
    The hotel is a perfect place for hackers to attack because they have easy access to retrieve thousands of guest information including credit card information, billing addresses, and much more personal information. Nicholas Percoco, senior vice president of Trustwave's SpiderLabs, mentioned that the credit card and debit card information is the most in demand by hackers because it is easiest to turn into cash quickly. There are three main steps in a typical data breach and how attackers mostly operate at each level: initial entry, data harvesting, and exfiltration. Close to half of these attacks occur via remote access applications, of which 90 percent exploit default or weak passwords. Around 42 percent of attacks occurred via third-party connections; 6 percent via SQL injection; 4 percent via exposed services; and 2 percent via remote file inclusion attacks. Interestingly, less than 1 percent began with an email Trojan. As an IT manager of the hotel, it is crucial to recognize how serious the consequences are for the hotel should the data not be protected well. 
  •  
    Hey all, here is an article I found that talks about hackers taking over the hospitality industry. It mentions how hackers main objective is to gain access to debit accounts and gain access to customer cash. Also, hackers are also able to infiltrate POS systems along with other valuable technology with in the hospitality industry. Nearly half of these attacks occur via remote access applications, of which 90 percent exploit default or weak passwords, according to the report. Around 42 percent of attacks occurred via third-party connections; 6 percent, SQL injection; 4 percent, exposed services; and 2 percent, remote file inclusion attacks. Interestingly, less than 1 percent began with an email Trojan.
  •  
    hackers are EVERYWHERE!
anonymous

4 ways to use HR systems to communicate as COVID-19 develops - 0 views

  • As HR teams navigate the new remote work environment caused by COVID-19, an organization's human resource information system has become a critical tool for keeping employees connected
  • Managers are on the front lines of employee relations, so they are critical in facilitating business responses to COVID-19
  • Here are four ways HR can employ an HRIS during the COVID-19 pandemic.
  • ...9 more annotations...
  • Use employee contact information
  • Up-to-date employee contact details are important so HR can share company news in a timely manner.
  • anagers will then be able to alert employees about new working hours, COVID-19 infections within the company and office closures.
  • Show policy changes
  • HR teams should keep the HRIS updated to reflect new and revised policies related to COVID-19.
  • Help the company stay on track
  • HR should ensure employees know how to view schedules and record time worked remotely. This may be a new process for employees who relied on their manager to post this information in a paper-based format.
  • Keep employees engaged
  • An HRIS system's collaboration or community features can provide managers with an environment that brings teams together to work on projects or just gives employees a way to keep in touch during a period of social distancing and remote work isolation.
  •  
    These are some tips and tricks for managers to use in order to really utilize the full potential of an HRIS during this pandemic. With remote working become the new reality, it is important to still remain on the same page with your team.
natalieemmanuel

Point-of-sale malware has now infected over 1,000 companies in US | Ars Technica - 0 views

  • According to the US-CERT advisory, the group behind the Backoff malware operation scanned the Internet to find potential victims by detecting installations of the remote-desktop software frequently used by service providers to manage the point-of-sale systems of their retail clients. The attackers look for remote desktop solutions like Microsoft’s Remote Desktop, Apple's Remote Desktop, Chrome Remote Desktop, Splashtop 2, Pulseway, and LogMeIn, according to the advisory. Once a potential target is identified, the group uses the equivalent of a digital sledgehammer, attempting to break into the system using a list of common passwords.
  • Such techniques are a common threat to small retail businesses, according to Trustwave, who helped the government agencies in their analysis of and response to the 'Backoff' program. A third of cybercrime attacks on businesses focused on the point-of-sales systems in 2013, according to the company's 2013 Global Security Report. In 31 percent of incidents, attackers exploited weak passwords to gain access to targeted systems
  •  
    It is hard to forget how thousands of Target customers financial information was compromised last year due to a breach in security of the company's POS. Target is not the only company that has been infected with this program that steals credit and debit card information. Actually, there have been more than a thousand businesses affected by this malware that has come to be called "Backoff." The malware targets POS systems and has stolen millions of credit card numbers as well as personal information on millions of customers. A large majority of cybercrime is focused on attacking business's POS systems. The malware attacks systems by going through a list of common passwords until it is able to hack the system. "Backoff" then disguises itself as a compatible Java component and collects credit card information. However, Apple has recently announced Apple Pay and many believe this can diminish a lot of cybercrime.
  •  
    It is hard to forget how thousands of Target customers financial information was compromised last year due to a breach in security of the company's POS. Target is not the only company that has been infected with this program that steals credit and debit card information. Actually, there have been more than a thousand businesses affected by this malware that has come to be called "Backoff." The malware targets POS systems and has stolen millions of credit card numbers as well as personal information on millions of customers. A large majority of cybercrime is focused on attacking business's POS systems. The malware attacks systems by going through a list of common passwords until it is able to hack the system. "Backoff" then disguises itself as a compatible Java component and collects credit card information. However, Apple has recently announced Apple Pay and many believe this can diminish a lot of cybercrime.
rhoff019

Council Post: Cybersecurity As We Know It Is About To Change - 0 views

  • the global cybersecurity market is set to increase to $270 billion by 2026. This signals the priority boardrooms have placed on cyber risk management even as digital transformation takes place en masse.
  • COVID-19 has become the catalyst to trigger change in the ways we manage and operate technology.
  • Virtual desktops emulate a computer system so that IT can control access as such adding input/output devices as well as software and applications. This could become an important control point when remote workers are operating outside the safety of a corporate network.
  • ...15 more annotations...
  • Telecommuting Is The Only Way Of Working For Many
  • With the remote working concept taking center stage, re-evaluation of these policies is needed to address the new cyberthreats.
  • With millions of employees working from home, hackers’ focus has shifted from enterprise to remote working individuals. To handle the menace that exists in cyberspace, decentralized cybersecurity will rise where greater emphasis will be placed on data sources such as actual remote employees themselves.
  • User access controls have largely revolved around single or two-factor authentication. These methods rely on “something you know (username)” and “something you have (password).”
  • This means identity protection will be a top priority, and the best defense should involve building authentication systems that focus on “who you are.” This would require advanced biometric solutions such as fingerprint/thumbprint/handprint, retina, iris, voice and other facial recognition technologies.
  • The current state of privacy regulations is designed around the enterprise network and building the proverbial wall to keep sensitive data out of prying eyes.
  • With swift digitalization, security controls will shift to data sources, similar to the trend witnessed in IoT.
  • From a risk management perspective, global privacy policies will need to encapsulate standard operating procedures regarding BYOD, GDPR compliance and state privacy laws.
  • The shift to cloud services offers employees, customers, suppliers and everyone else across the ecosystem a seamless and frictionless way to access data and applications. Remote access by various users would compound security challenges and present many new potential attack vectors. In the post-pandemic world, IT resources could shift toward data, particularly keeping data secure across cloud platforms.
  • This will facilitate cybersecurity teams to apply varied access controls and demarcate data storage to minimize the risk of cyber intrusion and data breach.
  • Innovative technologies such as ML/AI and AR/VR will see greater adoption. As we have already witnessed, video conferencing applications will continue to rise as non-contact interactions surge.
  • Sectors such as retail, hospitality and manufacturing will layer their adoption of robotics with added AR/VR capabilities.
  • Cybersecurity teams that are saddled with an events-based approach will be overly burdened with triages when a cyber breach occurs. By embracing an intelligence-driven approach, businesses can digitalize confidently with external threat intelligence as the guiding beacon.
  • Social engineering techniques to trick untrained and unsuspecting employees, third parties and contractors into releasing confidential information or letting an intruder into a corporate network will also intensify accordingly.
  • Cybersecurity awareness training for people across the entire supply chain and ecosystem will prevail.
  •  
    By 2026, the investment in cybersecurity will increase to $270 billion globally. After the COVID-19 pandemic companies will need to reevaluate their cybersecurity systems to adapt to telecommuting as many companies will have some of their employees working from home. Biometric security such as a fingerprint or iris scan will become more common as the typical password will no longer be as secure as it once was.
YIZHE YANG

LGR - Computer network development - 1 views

  •  
    In this paper a computer network is defined to be a set of autonomous, independent computer systems, interconnected so as to permit interactive resource sharing between any pair of systems. An overview of the need for a computer network, the requirements of a computer communication system, a description of the properties of the communication system chosen, and the potential uses of such a network are described in this paper.
  •  
    The goal of the computer network is for each computer to make every local resource available to any computer in the net in such a way that any program available to local users can be used remotely without degradation. That is, any program should be able to call on the resources of other computers much as it would call a subroutine. The resources which can be shared in this way include software and data, as well as hardware. Within a local community, time-sharing systems already permit the sharing of software resources. An effective network would eliminate the size and distance limitations on such communities. Currently, each computer center in the country is forced to recreate all of the software and data files it wishes to utilize. In many cases this involves complete reprogramming of software or reformatting the data files. This duplication is extremely costly and has led to considerable pressure for both very restrictive language standards and the use of identical hardware systems. With a successful network, the core problem of sharing resources would be severely reduced, thus eliminating the need for stifling language standards. The basic technology necessary to construct a resource sharing computer network has been available since the advent of time-sharing. For example, a time-sharing system makes all its resources available to a number of users at remote consoles. By splicing two systems together as remote users of each other and permitting user programs to interact with two consoles (the human user and the remote computer), the basic characteristics of a network connection arc obtained. Such an experiment was made between the TX-2 computer at Lincoln Lab and the Q-32 computer at SDC in 1966 in order to test the philosophy.' Logically, such an interconnection is quite powerful and one can tap all the resource of the other system. Practically, however, the interconnection of pairs of computers with console grade communication service is virtually useless. Firs
Xueling Wang

Why Use Web Based Point-Of-Sale? | Business 2 Community - 1 views

  •  
    A web based point-of-sale (POS) system is also called cloud POS.  This new technology allows managers to control operation remotely. The employees also can perform actions on the restaurant's computers through a mobile POS device. Some mobile POS devices will even allow employees to swipe credit cards and print out receipts on the spot. Compared with the traditional POS, web based POS makes it easier to fix any problems with the system, because a technician can access the business's account from a remote location and fix it right away.
Joshua Frost

Future POS Releases Innovative Mobile Apps For Restaurants - 0 views

  • Future POS Releases Innovative Mobile Apps For Restaurants
  • Future POS Mobile Ordering and Future POS Remote Control
  • With Future POS Mobile Ordering, restaurateurs can enhance the end-user experience by offering their customers the convenience of placing orders directly from their smartphone.
  • ...1 more annotation...
  • To provide an added level of flexibility, the app delivers on-the-go access to store level data, and it features five scrollable screens of configurable reports and charts. Future POS Remote Control also allows operators to easily link one phone to multiple stores, update menu prices and send messages directly to the staff or POS system.
  •  
    This article is about a latest point-of-sale technology released by Future POS that occupy a prominent place in Point of Sale software crowd designed for the hospitality industry. The release of two mobile apps for restaurant, Future POS Mobile Ordering and Future POS Remote Control, alters the way restaurant owners and customers interact with the point-of-sale system. With Future POS Mobile Ordering, restaurants now enable their customers to order directly from their Smartphone. Moreover, Future POS Remote Control allows restaurant owners/managers to run their restaurants more efficiently and flexibly by delivering on the go access to store level data and connecting with multiple stores through one phone. One of abilities the restaurants are having is updating menu prices and sending massage to the staff or POS system with that phone. I think although not everybody is willing to use these technologies, there is obvious reason this trend are gaining popularity. These kinds of technologies provide convenience for both the majority of customers and restaurant owners.
  •  
    I think I posted this article before but...ehh.. It talks about how restaurants will soon be using mobile applications as points of sales for customers. The reasoning behind the development of this company is to provide convenience to the clients and deliver services faster.
Leann Taylor

Samsung Unveils Game-Changing DRM Technology for Hospitality Industry | EON: Enhanced O... - 1 views

  • enable true
  • remote, software-based management without costly maintenance
  • allows encrypted
  • ...10 more annotations...
  • content to pass in a secure manner and be displayed on the TV
  • alternative to traditional entirely hardware-based content protection systems
  • allows a lost stream to be restarted and remedied as an isolated incident, without any additional guest disruption
  • ests in a secure and compliant manner. By eliminating the need for legacy chip-based solutions at the head end as well as in the TV or set-top box, Samsung LYNK ™ saves facilities cost and labor, while also increasing system integrity.
  • eliminates the need for DRM hardware provisioning and licensing, reducing significant expenses for the hoteliers.
  • system corrections and updates to be made automatically and remotely
  • They are then able to sync the technologies and seamlessly provide in-room entertainment to gu
  • enable guests to stream their own content from personal devices to their in-room TV in a secure manner through mobile applications.
  • upgradable with system firmware updates and allows for content to be unlocked without the need for external devices.
  • provides efficient system renewability and allows for natural future scalability to expand the hotel’s channel lineup and to respond to future compliance requirements.
  •  
    Samsung LYNK is the new alternative to traditional Digital Rights Management (DRM)  in the hospitality industry. DRM is the hotels way of controlling and maintaining protection of copyrighted material through the use of technological tools. With tools such as Samsung LYNK copyrighted materials such as music and movies can be used on hotel premises without allowing residents to duplicate material. The LYNK provides cost saving efficient solutions that can all be controlled in a remote secure way. Not to mention, all DRM control can be done through hotel room televisions. 
Xue Yan

Top 2012 PMS Trends: NORTHWIND Showcases Guest Loyalty for Independents, Maestro Cloud ... - 0 views

  • The Property Management System (PMS) trends topping the list in 2012 are Mobile optimization for management and guest-facing systems
  • Many independent operators are leveraging remotely-hosted cloud platforms to reduce expenses, create operating efficiencies, secure cardholder information, and to have instant remote access to their property or hotel group’s data
  • NORTHWIND helps independents generate greater revenue by providing a complete mobile-optimized online presence and eBusiness services for hotels that do not have their own mobile or online initiative.” 
  • ...8 more annotations...
  • “Mobile web access from smartphones will surpass traditional PCs by 2013 according to Gartner Research,”
  • The Property Management System (PMS) trends topping the list in 2012 are Mobile optimization for management and guest-facing systems ;
  • PMS) trends topping the list in 2012 are Mobile optimization for management and guest-facing systems ; Direct Web and Social Media Booking
  • reservation software tools; hosted solution options for reduced IT investment; and Guest Loyalty systems to keep guests coming back. 
  • Maestro’s hosted PMS is a solid, reliable alternative to property-based platforms that saves operators money and streamlines operations
  • Mobility is the second top trend in 2012 PMS technology.  “Mobile web access from smartphones will surpass traditional PCs by 2013 according to Gartner Research,”
  • NORTHWIND helps independents generate greater revenue by providing a complete mobile-optimized online presence and eBusiness services for hotels that do not have their own mobile or online initiative.”  
  • Maestro’s Guest Loyalty System with online capabilities is the first application to offer independents the same benefits as major chains to recognize, reward, and retain guests.
  •  
    This article discusses some current trends in property management systems and how Maestro by NORTHWIND is ready to deliver. Maestro by NORTHWIND is a PMS used by many independent hotels and resorts and offers 20 integrated modules. One of the top trends for 2012 is mobile optimization for management and guests. More and more people are turning to mobile apps for personalized services, and express check-in and check-outs. Maestro Xpress Check-In App allows properties to use iPads and other tablets to do this anywhere there is WIFI. Maestro's App will also allow managers access to reports, and real-time activity from anywhere allowing managers more control over their business. Another growing trend is cloud PMS. Maestro has a cloud based system that claims it can increase productivity at the same time reducing costs. Managers can manage multiple hotels from a single location and reduce costs because they won't have to maintain an in-house PMS. There is also a steady increase in direct online booking from mobile apps and social media sites. Maestro Web Connection reduces the commissions paid to online travel agencies and 3rd parties by allowing guests to book reservations directly. Another way Maestro helps independent hotel chains is by offering them a guest loyalty system to help them offer some of the same incentive and reward programs offered by larger hotel chains.
  •  
    Northwind Maestro leads the innovations of industry. Cloud system platforms are not just for the large chains. Small, independent operators also can use web-enabled platform with lower cost. Mobile is another trend of PMS innovations. Customers can check in and checkout on iPad by using Maestro Mobile Apps. In addition, direct-booking online from Mobile is the third top trend in 2012 PMS technology. Maestro's Guest Loyalty System with online capabilities is the first application to offer independents the same benefits as major chains to recognize, reward, and retain guests.
  •  
    Seeing the rapid development of mobile devices and social media, hoteliers are connecting PMS with mobile devices and social media. NORTHWIND Maestro™ is a kind of software which satisfies hoteliers' current requirement. NORTHWIND Maestro™ is an Internet-based PMS. It brings plenty of benefits to hotels. To illustrate, Maestro can reduce cost, create operating efficiencies, secure cardholder information, and to have instant remote access to their property or hotel group's data. Furthermore, since more and more people are using mobile devices to book rooms, make dining reservations or some other services, Maestro also develops mobile apps. "The Maestro Mobile App enables operators to wirelessly connect to their Maestro centralized system and provides access to management reports, real-time activity and other features found in Maestro." Maestro also thinks of customer loyalty by tracking customers and establish database.
Alejandra Kravets

Travel Kit - Grossed out by hotel TV remotes? There's an app for that - 0 views

  • travelers can currently use the app in more than 2,000 LodgeNet-serviced hotels and in more than 550,000 rooms, with a goal of having more than 1 million rooms "remote-free" by the end of the year.
  • Charles Gerba, an environmental microbiologist from the University of Arizona. Known as “Dr. Germ,” Gerba conducted studies of hotel rooms and found the remote control to have the most germs.
  •  
    LodgeNet Interactive Corporation just launched on Monday their new mobile app which allows hotel guests to control the television with a smartphone or tablet. The application can be downloaded online before check-in or at check-in in a hotel lobby or in-room via an on-screen QR code. Each guests receives a unique code to enter into the app, then the TV system matches it with their personal device. You can see the programming TV schedules, access information about the hotel and local restaurants and even call the front desk to set up a wake-up call. Not to mention, you will avoid the spread of germs by doing all this from your own smartphone or tablet!
LU DENG

Choice installs cloud PMS in 5,000th hotel | Hotel Management - 0 views

  • Choice Hotels International has deployed its cloud-based hotel property management system, choiceADVANTAGE, to its 5,000th hotel
  • . The software's innovative features include efficient guest servicing, sophisticated revenue management, complete groups functionality, remote access, and full integration with the company's programs. As a cloud-based software, the system is also accessible from any computer that offers Internet access.
  • "Specifically designed and built to seamlessly interact with our central reservation and customer relationship management system on the Internet, this software adds value for our hotel owners and we're thrilled for its now truly global footprint."
  • ...1 more annotation...
  • Rate Center management tool,
  •  
    Choice hotels have deployed their cloud based hotel property management system choiceADVANTAGE, to its 5000th hotel, which is the Comfort Hotel De L'Europe of Saint -Nazaire, France, and is one of the lodging industry's most widely distributed web-based proprietary systems. This is a very user-friendly system and according to the chief technology officer of the Choice Hotels, the software also has an integrated solution to manage guest interaction at every stage. some of its features are efficient guest servicing, sophisticated revenue management, groups functionality, remote access and integration with company's programs. one of their main reasons to do this was to reduce their cost of purchasing, storing, and maintaining the costly infrastructure and hardware associated with the previous management systems. The hotel group also installed the Rate Center management tool, which will allow them to manage their pricing and inventory.
  •  
    Good to see a strong working example of mass implementation like this. Proves that the web based model can work, so it will be interesting to see if more properties, and large chains in particular will adopt this model.
  •  
    Choice made a wise choice! The cloud-based hotel property management system, choiceAdvantage, allows Choice Hotel to become more competitive in the hospitality industry by mastering efficient guest service, sophisticated revenue management, remote access, and so on. Since it is cloud-based, the system can be accessible to any computer that have Internet connection. The reason why Choice has made a wise choice is that It benefits a lot from this system by using less money. Usually hotel needs to spend more for installing and maintaing infrastructure and hardware. Since ChoiceAdvantage system is web based solution, it needs a minimal initial investment and save hotel a large sum of money. Choice hotel now starts to combine other management tools with its choiceAdvantage system to become more powerful in management level, which taught us that high-technology can help hotels improve and develop faster if it is applied in the right way.    
Jia Zhu

Independent Operators and Hotel Groups Seeking Cloud-Based PMS - 0 views

  •  
    Northwind, provider of a cloud based PMS and reservation software solutions announced that independent operators and hotel groups seeking cloud based PMS. Maestro Suite is the cloud based PMS which Northwind provide its' service. The system is have 20 integrated modules to give operators a guest-centric and 360-degree view of all guests.It makes the operators be free from system support duties, maintain the property's modules and provide a secure environment for property data. This benefits the operators that they can focus their attention on guest service and revenue generating instead of concerning their data security. Also new staff can also learn the system more quickly because they can train from their browser from any location. A major advantage of cloud-based PMS is the lower labor cost. The IT person will no longer need on staff. Plus, this system will have no impact about the power outages. Independent multi-property host the system from their corporate offices to support their hotel groups. Cloud based PMS enables them to cross sell all their hotels and oversee operations for their entire enterprise. Another major advantage to cloud-based PMS us the ability of managers to monitor property performance remotely. Operators can remotely track all the performance data to help manage operations. Also the system does not require a property-based server so that the hardware cost is reduced. In a word, the cloud based PMS like Maestro benefits the independent operators and hotel groups with free up staff, provides PCI compliant secure environment, reduces hardware expenses and drives profitability.
galca008

Benefits of Human Resource Information System | Advance Systems Inc - 1 views

  • The world of HR has greatly been enhanced by technology. With new systems available to enhance productivity and streamline operations, those in human resources can achieve greater success with the benefits of human resource information system choices.
  • Depending on the type of system you choose, your company could see benefits ranging from cost and time savings to increased employee engagement and better adherence to compliance and regulations.
  • An HRIS can make the onboarding process an efficient and consistent one. By providing easy access to training materials and handbooks for new employees and storing all new employee information in one convenient place
  • ...5 more annotations...
  • An HRIS system can eliminate paper and turn all of your employee records into easy to access online data. These can be retrieved simply by anyone with authorization and are backed up remotely to ensure safety.
  • When you can automate payroll by integrating it with your HRIS, you take hours of work off your HR team’s shoulders. You can also automate tasks such as immediate approval or denial of time off requests based on set rules, shift change alerts, and other time-consuming jobs.
  • With biometric timekeeping, your HR team knows in real time where employees are in case they are needed. This can be especially helpful in situations where deliveries need to be made or customers need in-person help.
  • Employee self service tools allow your employees to clock in and out with their personal smart device, making it easy for them to work from remote offices or from home. They can also use the HRIS platform to efficiently check their schedules and make any changes necessary without having to come into the home office.
  • An HRIS system provides one simple mode of communication that is easy to use and organize. This not only allows employees to talk with colleagues about ongoing projects, but also request shift changes, explain absences, and put in for annual leave or vacation.
  •  
    This article talks about the benefits of HRIS implemented in the workplace. The benefits are both for HR Departments and Employees as well. These systems save time and also money, and are able to better adhere to compliance regulations. These systems are able to track an employee from a candidate stage to termination. It makes the onboarding process a quicker one and employees are able to access trainings online as well as their handbooks. Eliminating paperwork and having records all in one place is another benefit, and those with access can easily retrieve a file in seconds. Automatic payroll facilitates the process, and approving or denying requests and shift changes are also able to be completed with ease. This also provides flexibility for employees to clock in and out from their smart phones if they work remotely, they can also check their schedules easily and communicate to others through these systems. This is a great article that highlights the benefits of HRIS. I use one of these systems on a daily basis, and I can vouch for it's efficiency to my daily tasks.
dulvanesei

Canalys: Cloud spending hit record $31 billion in Q1 2020, but growth continues to slow... - 0 views

  • the cloud
  • spending increase was an established trend, with Q1 2019
  • These numbers also show that while the overall dollar spend continues to rise, the rate of growth is slowing.
  • ...4 more annotations...
  • But while cloud usage has certainly been up, service providers have experienced a downside —
  • Indeed, some of the industries hit worst by the global pandemic — such as hospitality, tourism, and construction — have cut or delayed planned cloud spending.
  • We saw an unprecedented surge in demand and use of cloud-based applications primarily driven by remote working — not just collaboration tools, but also cloud security, which was also added to by increased ecommerce and other online activity
  • What is clear, however, is that cloud services will likely only grow in demand if remote working continues in the future.
  •  
    this article is about the increasing demands of cloud computing, and is also leading to a rise in dollar spending. Remote working has been the drive for the increasing demands of cloud computing but as the result of the Covid-19 pandemic and the slow down of large business advising led project. The concern is that while the demands are going up, the actual growth of cloud computing is not.
1 - 20 of 284 Next › Last »
Showing 20 items per page