Skip to main content

Home/ Hospitality Technology/ Group items tagged response

Rss Feed Group items tagged

amajo017

Hotel Technology Challenges for Every Hospitality Business - 2 views

  • Interoperability Data Management Security & Privacy Responsiveness
  • ue to the lack of standardization and specialized hospitality technology solutions, most hotels tend to develop their own proprietary solutions to manage assets.
  • Non-standardized technology can induce added learning times & on-boarding periods for guests.
  • ...17 more annotations...
  • This issue readily highlights the significance of applied technology management.    
  • Knowing and understanding customers is essential in predicting their behavior, future visits, and demands.
  • As the amount of data grows within hotel databases, the responsibility of back office management is quadrupled.
  • Authorization for data access, network & database security, and centralized database management are major concerns for hotels in the coming age. 
  • everal news outlets and hospitality professionals have already identified that hospitality companies are one of the most susceptible to data breaches. 
  • Hotel technology infrastructures must ensure that all digital interactions with guests are reinforced through robust security tech & privacy rules
  • Most hotels are handicapped by the knowledge and expertise they carry on the subject. A more reasonable idea is to consult with a technology management company that offers better insights, suggestions, and security framework designs for hotels. 
  • Advanced Hospitality has helped various hospitality ventures take root and develop their competency with technologies.
  • Hotels also need to enhance responsiveness for renovations and routine maintenance.
  • A responsive hotel tech infrastructure demands stronger resources, simpler network mapping, and seamless synchronization with hotel back office systems. 
  • Hospitality technology may be the most amazing transition to occur in the hospitality industry but remember it does come with a cost.
  • An efficient & effective hotel technology must be responsive and should acknowledge guest requests instantly.
  • thering gue
  • Gathering guest data is essential to the success of any modern business, hotels are no different.
  • Data management carries great emphasis in European countries, more so than their North American counterparts. While the current US government believes in a more lenient approach towards data retention and privacy,
    • amajo017
       
      Will be useful with regards to the lack of data privacy in US
  • With multiple point-of-sale (POS) touchpoints, an even larger number of smart devices, and that data from both demands a secure hotel network. Denying cybercriminals access to the network and preventing them from spying on guest devices is now essential for every business.
  • Highly optimized & synchronized systems leave almost no gaps when fulfilling guest requests. These technological marvels can even complete guest requests faster than hotel staff at times. This efficiency delivers a seamless guest experience while improving the responsiveness of technology. 
  •  
    This article discusses research that shows four hotel technology challenges in 2019. These challenged include Interoperability, Data Management, Security & Privacy, and Responsiveness. It argues that hotel management should be aware of these technologies because they can either help or hinder your business.
  •  
    This is an excellent article that explores that businesses in the hospitality face in their day to day running. The challenges that the article points out identifies include the interoperability of hotel technology systems, the management of data, the security and privacy of data, especially in the current era of cloud computing, and the responsiveness of hotel technologies. Although hotel technologies improve guest experience and foster efficiency in hospitality companies, such challenges may adversely their efficiency, and thus, adversely affect guest experience.
  •  
    This article discusses what we talked about this week in regards to the different types of technological disruptors in the hospitality industry. It discusses data management issues, privacy issues, and how responsiveness can be improved within hotels. This article will be useful for future research as I look more into artificial intelligence within the hotel industry.
rosedelice

How to Combat the Negative Side of Consumer Behavior With Societal Marketing - 0 views

  • Some companies treat corporate social responsibility primarily as a form of branding. For instance, a company that donates 10 percent of profits to cancer research might develop a marketing plan to let the public know about its good works so customers will feel better about buying its products. A more comprehensive approach to societal marketing would include an examination of the company's products and services and what effect they have on the customer and the society.
  • Consumers generally say they want to buy products that are more environmentally sustainable or socially responsible, but that doesn't translate to actual sales if the product costs too much or doesn't perform as well as its rivals. It might seem as if there's a gap between what customers say they want and what they really want, but in reality they want it all. An unpleasant-tasting, expensive brand of fair trade coffee is not going to outsell a delicious and affordable rival just because it is fair trade. However, a delicious and affordable fair trade brand could do very well. The fact that the coffee is fair trade is a benefit to the consumer, but only if the coffee meets the customer's other requirements for taste and price. Effective societal marketing treats the social responsibility aspect as an extra benefit to choosing an already fine product.
  • Sometimes a company can make its marketing campaign more socially responsible by making relatively small changes to a popular product. For example, if a restaurant offers a children's meal option including a grilled cheese sandwich, chips and a soda, it could improve the menu by offering fresh fruit and milk or juice as options. Some parents will still decide to order the chips and soda, but some will choose the fruit and milk. The company is giving customers what they want either way, but by including healthier options the company is doing what it can to have a positive impact on society.
  •  
    Consumers generally say they want to buy products that are more environmentally sustainable or socially responsible.Effective societal marketing treats the social responsibility aspect as an extra benefit to choosing an already fine product. The company needs to give customers what they want either way by including healthier options.
cmogu001

Identifying 9 Solutions Hotel Security Concerns | 2014-07-22 | Security Magazine - 0 views

  • Business and recreational travelers demand safe and secure hotel accommodations and responsive and friendly customer service.
  • A single act of crime on your property could diminish your brand.
  • Maintain Security-Minded Customer Service
  • ...13 more annotations...
  • While maintaining friendly, responsive interactions with customers is crucial, it is also important to vigilantly follow all security protocols.
  • Key Card Access Review
  • Hotels need to ensure that their key card access systems are not vulnerable to hacking or unlawful access.
  • Establish Evergreen Background Screening Protocol–
  • Assess Location and Local Crime Statistics–
  • Control After Hours Access– For maximum safety, posting security personnel at front entrances and other access points is vital
  • When your guests feel that they are both welcome and watched-over, they will feel more comfortable.
  • When private security works in partnership with law enforcement to respond to these issues, police officers have more time to focus on solving crimes and enforcing the law.
  • Maintain Emergency Response Plan and Team–
  • Proactive security efforts and emergency planning initiatives should also involve everyone with a vested interest in safety and security.
  • Commitment to Ongoing Training–
  • Security professionals should be able to access training in a way that benefits their lifestyle whether it is online or classroom training. 
  • Ensuring that all public spaces are continually monitored by staff and security personnel is crucial in maintaining a hospitable environment. 
  •  
    This article expounds how hoteliers can ensure that their property provides a secure environment, while maintaining friendly customer service. This article goes into further detail about implementing key card access reviews in order to prevent the possibility for a criminal to gain undetectable entree to millions of keycard-protected hotel rooms. According to this article, establishing evergreen background screening protocols and controlling after hours access was also crucial in Hotels ensuring that their key card access systems are not vulnerable to hacking or unlawful access. Above all else, this article goes into great depth about maintaining an emergency response plan and team that would allow hotels to proactively implement prevention and response plans for everything from workplace violence to natural disasters.
cpaez007

Recycling Electronic Waste Responsibly: Excuses Dwindle - The New York Times - 0 views

  • Recycling electronics is becoming easier by the day.
  • Still, most old gadgets end up in the trash. Americans alone throw away two million to three million tons of electronics yearly, according to the Environmental Protection Agency. With the life span of devices shrinking — the average phone is replaced every 18 months — the problem keeps growing worse.
  • The solution is not just recycling. It’s to be sure that you’re recycling with a responsible processor.
  • ...2 more annotations...
  • EStewards and S.E.R.I. use a network of auditors to make sure companies like GreenCitizen are doing what they say they’re doing.
  • Organizations around the world have been certified by S.E.R.I. and eStewards. Both groups let you search their websites for local options. In New York, for example, you can take electronics to GreenChip Electronic Waste Solutions, an R2-certified recycler, or have them picked up by 4th Bin, which is certified by eStewards and also has R2 certification.
  •  
    The issue of illegal electronic dumping has been a real severity, and mostly because people are unaware of what happens to the products that they used to own. Luckily, our world is advancing to a point where appropriate disposal is being greatly developed. There are different mainstream companies that will take your old products to refurbish them, or handle them accordingly. Most importantly, there are companies like GreenCitizen, who are responsibly recycling products. They gather all of the old technology, and attempt to refurbish it. If not possible, then they use the parts, or just dispose of it in the right way. Certified monitors of the recycling process look over the practices of GreenCitizen to make sure that they are doing their jobs correctly. Actions are being dealt more responsibly, as the EPA and these certified monitors have gotten involved. Recycling used to be claimed, but done wrongly. Now, these groups closely overlook the process, and ensure that things are being done appropriately.
mserr078

5 ways tech can make your hotel more responsible | Green Hotelier - 0 views

  • Managing Director of EPOSability Robbie Francis says employing eco-friendly technology is a great way to show guests that you’re committed to making a difference.
  • Heating energy expenditure makes a big contribution to a hotel’s carbon footprint
  • reduce your energy consumption by up to 10%
    • npate083
       
      A building energy management system can reduce energy consumption by 10 percent.
  • ...4 more annotations...
  • 600,000 tonnes of compostable food waste each yea
    • npate083
       
      Waste management technology like Lean, can help save on food waste by helping the managers understand how much needs to be ordered.
  • ask guests to consider the environment before requesting new towels each day
  • using 25 kW/h on average in comparison to a Windows-based system with on-site server that consumes 800 kW/h. That’s a 97% saving!
    • npate083
       
      iPad POS systems help save costs and the environment significantly. By using the iPad POS systems you are going paperless, reducing engineering visits and tracking waste.
  • Using technology doesn't just mean computers back of house or modern check-in systems, technology can help create a more efficient kitchen, laundry, bar, housekeeping service or HVAC, it's always worth looking around to see what new systems on the market could help reduce your water, carbon, waste or energy consumption and help make your hotel that little bit more environmentally responsible.
  •  
    Going green is one thing to consider if a hotel wants to save money and conserve the environment. This article discusses 5 tech ways to make some green changes in your hotel. Some points were to change the lighting to energy saving lighting. Using sensor lighting saves you money and shows guests that you care to conserve. Laundry technology and asking guests to only give towels that are unwanted instead of changing towels everyday. A system monitoring the heat and cooling system can regulate temperatures reducing the cost of unnecessary use of the system.
  • ...3 more comments...
  •  
    Robbie Francis expresses the importance of helping the environment and helping your guests feel like they are a part of something bigger. Not only does becoming more green and eco-friendly help the environment, but it also allows for many of our wastes to decrease, electricity and water bills are just part of the issues that begin to decrease monetarily. When speaking about green computer technology this article incorporated how it is important to review what new systems are out to help reduce our carbon footprint and ultimately make ourselves just a "little bit more environmentally responsible!"
  •  
    The article is about eco-friendly heating and energy, waste reduction technology, sustainable laundry, lighting technology, and iPad POS systems.
  •  
    Robbie Francis expresses the importance of helping the environment and helping your guests feel like they are a part of something bigger. Not only does becoming more green and eco-friendly help the environment, but it also allows for many of our wastes to decrease, electricity and water bills are just part of the issues that begin to decrease monetarily. When speaking about green computer technology this article incorporated how it is important to review what new systems are out to help reduce our carbon footprint and ultimately make ourselves just a "little bit more environmentally responsible!"
  •  
    This article is about ways for hotels to use green tech to be more responsible.
  •  
    "The latest innovative technology solutions can work to increase energy efficiency, cut down on material waste and even increase profits for your hotel". I remember while working in San Antonio Texas as a hotel AGM, the hotel had an agreement with the city water company for us to send them each week the readings of how much water we had used up to that point from last week, and they would give us rebates if our consumption wouldn't fluctuate certain parameters. We were being environmentally friendly, saving money by not overpaying and receiving rebates for our eco-responsibility.
jessielee214

How to manage risks in tourism? | CBI - Centre for the Promotion of Imports from develo... - 0 views

  • 1. What is risk management?
  • Risk management is a planned process through which organisations manage active crises.
  • A crisis is defined as a time of difficulty or danger and is usually a time when difficult or challenging decisions must be made.
  • ...29 more annotations...
  • 2. Before a crisis: Have a Risk Management Process in place
  • A Risk Management Process aims to reduce the uncertainties of actions taken during a crisis. It is important to have this is place in advance, so that your organisation is well prepared for unexpected events that may happen in future.
  • Establish the context
  • Identify the risks
  • Know who your stakeholders are
  • Analyse and evaluate risks
  • Analysing risks involves determining the likelihood of a crisis occurring and their possible consequences, from insignificant up to catastrophic. Understanding which possible crisis would have the most negative impact will enable you to decide on the priority course of action.
  • Treat risks
  • Communicate and Consult
  • Being visible and keeping in touch with your stakeholders is one of the most important factors of risk management, and it must be done on a continuous basis in all stages, before, during and after a crisis.
  • No two crises are the same, and some destinations will be more susceptible to particular crises than others. You should carry out a risk analysis, drawing up a list of crises that might happen based on those that have occurred in your region/country in the past and may happen again.
  • ou should revisit your website regularly and publish the most recent information about the impact a crisis is having on your destination/region.
  • Use your website and social media to keep in touch
  • Draw up a list of your stakeholders to get a clear overview, so you can ensure they are included in all correspondence you issue.
  • It is really important to date your website communications, so that users can be sure they are receiving the most up-to-date information.
  • Monitor and review
  • Crises are often fast-moving; situations tend to be highly changeable and can be volatile. This means that current processes, plans or procedures that you have in place to deal with a crisis should be regularly reviewed and updated. Your plan should be flexible and dynamic, so that you can adapt easily to the changing situation when a crisis happens.
  • Training and testing
  • Once you have formulated your Risk Management Plan, you must train your staff and test the plan.
  • 3. During the crisis: Follow these four steps
  • Once a company is in the middle of a crisis, the first thing to do is to understand the situation as best you can and understand the impact it can have on your organisation. This is a continual process as one of the characteristics of a crisis is that it’s always changing, and the effects on your business will also constantly shift.
  • 1. Mitigation
  • Mitigation refers to the initial actions that the company that is directly in the face of the crisis or emergency needs to carry out. These are the first steps that need to be taken to protect the ones in the immediate line of fire – teams, customers, suppliers, industry partners and finances.
  • 2. Preparedness
  • he mitigation stage of the crisis management could be a very short process or a long, drawn-out process, depending on the immediate effect of the crisis on your business. At the same time, the process to start preparing the business for this particular crisis can be key to the next stages of Response and Recovery.
  • 3. Response
  • The majority of crisis management lies in the response to the crisis. All the preparation you have already done to protect the company and its assets will help you in the response stage.
  • 4. Recovery
  • It is difficult to know when the Response phase becomes the Recovery phase. However, it is clear that, while you are on the road to Recovery, you should to continue to follow the steps you established in the Emergency Response Plan. As in the previous steps, you should be continuously refining and updating the plan, based on the current situation. Flexibility during the Recovery phase continues to be important. Your organisation may look different following all the changes you may have made as a result of the crisis, and your markets may also have changed.
  •  
    This article uses diagrams and gives the step to let us know the processing of managing the risk. Also, it teaches a four-step process- Mitigation, Preparedness, Response, and Recovery to address a crisis successfully.
Jing Huang

Hotel Lock Firm's Security Fix Requires Hardware Changes For Millions Of Keycard Locks ... - 4 views

  • Good news for the security of hotels and travelers: Onity, whose keycard locks can be found on at least four million rooms around the world, has a plan to fix a security flaw
  • Black Hat security conference by Cody Brocious, a Mozilla developer who showed that he was able to insert a device he built for less than $50 into the data port on the underside of Onity’s locks, read their memory to find a decryption key, and use it to gain access to the lock’s firmware and trigger its open command in a matter of seconds.
  • The company’s response to that epic security bug has two parts–a quick fix, and a more rigorous one, both of which it plans to make available by the end of August: First, it’s issuing caps that cover the data port Brocious’s hack exploited, which can only be removed by opening the lock’s case.
  • ...6 more annotations...
  • “If such a significant issue were to exist in a car, customers would likely expect a complete recall at the expense of the manufacturer,” Brocious adds. “I can’t help but feel that Onity has the same responsibility to their customers, and to customers staying in hotels protected by Onity locks.
  • But since then, two hackers who asked not to have their names revealed have claimed in emails to me that they independently replicated the exploit and refined it, so that it now works on any Onity hotel room lock. Brocious tells me he’s spoken with eight or nine hackers who have all been able to replicate his work to some degree.
  • “We want to assure you that Onity is working on providing you with a solution that will address any potential risks related to the alleged vulnerability of these locks,”
  • Onity isn’t the only one to come under fire in wake of its security flap: Brocious has also been criticized for failing to warn Onity ahead of his Black Hat demonstration and for selling a licence to use his Onity-hacking trick to a locksmith training firm for $20,000 long before he made his findings public.
  • Onity issued a statement responding to last month’s presentation at the Black Hat security conference by Cody Brocious, a Mozilla developer who showed that he was able to insert a device he built for less than $50 into the data port on the underside of Onity’s locks, read their memory to find a decryption key, and use it to gain access to the lock’s firmware and trigger its open command in a matter of seconds.
  • Onity will offer its customers new circuit boards and firmware that ostensibly fix the problems Brocious demonstrated–But Onity is asking owners of some models of its locks of some to pay a “nominal fee” for the fix, while offering others “special pricing programs” to cover the cost of replacing components.
  •  
    In the article, "Hotel Lock Firm's Security Fix Requires Hardware Changes For Millions Of Keycard Locks," it talks about how Onity has a plan to fix a security flaw that allows hackers to insert a homemade device into the lock and open the door in a matter of second. The only problem with this new plan is that it requires hardware changes to every affected lock and it even might require it customers to pay for it. "Black Hat security conference by Cody Brocious, a Mozilla developer who showed that he was able to insert a device he built for less than $50 into the data port on the underside of Onity's locks, read their memory to find a decryption key, and use it to gain access to the lock's firmware and trigger its open command in a matter of seconds." It seems crazy that hackers can break in so easily, so maybe this expensive security could be worth it in the long run. The company responded with two different parts, first, it's issuing caps that cover the data port Brocious's hack exploited and the second more substantial: Onity will offer its customers new circuit boards and firmware that ostensibly fix the problems. Before reading this article I had no idea that it was so easy for hackers to get into hotel rooms, this really makes you think twice before you decide which hotel you will be staying at!
  •  
    The hardware of hotel is the locker. This article showed us there is a new key card locker was discovered by Onity's. It is more security but it need to change all the affected lock. It is a lock built for less than $50 into the data port on the underside of the Onity's locks. The company's response to that epic security bug has two parts-a quick fix, and a more rigorous one, both of which it plans to make available by the end of August: First, it's issuing caps that cover the data port Brocious's hack exploited, which can only be removed by opening the lock's case. To further stymie hackers who would try to open the locks and remove that cap, it's also sending customers new, more obscure Torx screws to replace those on the cases of installed locks.The company's response to that epic security bug has two parts-a quick fix, and a more rigorous one, both of which it plans to make available by the end of August: First, it's issuing caps that cover the data port Brocious's hack exploited, which can only be removed by opening the lock's case. To further stymie hackers who would try to open the locks and remove that cap, it's also sending customers new, more obscure Torx screws to replace those on the cases of installed locks. The safe issue became the most important issue of the new products. It will cost more money of each hotel and it is really safe or not is still a question. 
anonymous

Integrating social into CRM for smarter customer care | ZDNet - 0 views

shared by anonymous on 03 Jun 12 - No Cached
  • Customer Relationship Management can only get better with the integration of social tools into the customer process.
  • Lauren McKay tweeted about how much she loved cornbread when she was staying in the Gaylord hotel.
  • Room service delivered a selection of cornbread and a hand written note referring to her tweet four months before.
  • ...7 more annotations...
  • Examples such as this are a great validation for the socially savvy Gaylord chain.
  • We communicate using many different channels. Of course some of us prefer to use the phone to sort issues out but increasingly we might prefer to use instant messaging, Facebook or Twitter.
  • Brands are trying to go social with their customer interactions, but are struggling to integrate social channels into their traditional systems. Traditional CRM, or indeed social CRM might not allow the customers to interact with a real person from the brand.
  • Information from Twitter feeds back into its social CRM system and added to the customer record.
  • But brands sometimes have challenges integrating the flood of information into social CRM systems. It can be difficult to keep track of each channel of communication.
  • It uses social customer interactions and real time social monitoring of Twitter and Facebook pages. Real time monitoring of conversation is vital if the brand is to be proactive and responsive to the customer.
  • “Industry reports indicate that of customers who complain about a company on social media, more than 70 per cent of those complaints receive no response from the company. It’s time for change”.
  •  
    This article discusses how CRM's use social media to promptly communicate with customers. I thought it was very interesting that 70% of the complaints made by customers via a sm outlet are not responded to. Examples are given as to how some companies use teams whose specific responsibility is to respond to customer complaints by text, email, twitter, and/or facebook. I thought it was cool that one guests tweet about loving cornbread, turned into a response by room service to deliver cornbread right to her room.
lderi004

Waste Management And LG Provide Hotel Operators New Sustainability Option, Convenient D... - 0 views

  • The leading provider of flat-panel HDTVs to the lodging industry, LG Electronics USA, Inc., and the nation's leading recycler, Waste Management, Inc. (NYSE: WM), today announced the first recycling program for hotel operators to responsibly dispose of outdated television sets and computer monitors.
  • To support this growing trend, LG Electronics will now offer environmentally conscious hotel, motel and resort operators a convenient, cost-effective opportunity for recycling the obsolete hotel TVs.
  • "This program will encourage hotel operators to dispose of outdated electronics in an environmentally responsible manner," said Teddy Hwang, president, LG Electronics USA, which established its successful nationwide electronics-recycling program for consumers with Waste Management over a year ago
  • ...3 more annotations...
  • The hotel TVs and computer monitors collected under this program will be processed in an environmentally responsible manner at one of four regionally designated Waste Management recycling facilities that are ISO 14001 and 9001 certified to protect the local environment in those communities along with the people handling this waste.
  • "As the lodging industry seeks to increase its environmentally conscious initiatives, the LG program gives hotel operators the opportunity to conveniently recycle electronic waste responsibly and economically," said Patrick DeRueda, president of WM Recycle America.
  • "By recycling used, unwanted, obsolete or damaged electronic equipment, useful materials such as glass, metals and plastics may be recovered for reuse in other products," he said.
  •  
    This article caught my attention because it was not just the Waste Management service offering a new sustainable option for hotels, but an actual electronics provider as well, LG. It appears that since 2009, LG has been partnering with Waste Management, and helping hotels dispose of their old electronics, such as older LG tv models, in a much safer and environment friendly way. This gives hotels no excuse to not dispose, or recycle, electronics in a safer manner. I believe a partnership like this is a perfect demonstration of a social responsible company, who is aware and active of the damages their products can make toward the world. I hope more electronic companies start partnering up like this; as it brings awareness, and convenience to not just hotels, but many industries that use, and frequently update, electronic devices. 
rnobl005

Meeting Planners Are Struggling With the Fast Evolution of Event Technology - Skift - 1 views

  • Meeting Planners Are Struggling With the Fast Evolution of Event Technology – Skift
    • rnobl005
       
      Skift posted this article almost a year ago but I felt like it was still applicable today. It definitely speaks to this week's subject of integrating IT into a business and the time invested. Event related technological solutions have boomed in recent years but this article finds that meeting planners are having trouble navigating cloud-based event management platforms like Cvent. I actually had personal experience with this in my previous role - I was on the receiving end of the RFP meaning planners would want me to generate quotes for them. Unfortunately our venue didn't have consistent pricing rates so I would have to personally contact the requestor to learn more about their event, which defeats the purpose of the software. Eventually we just stopped using the system altogether but couldn't figure out who to speak with at Cvent to close our account - so to some planners it appeared as though we were flat out ignoring their business. What I found interesting about this article is that those planners also had issues with the system, specifically with the lack of clarity and poor response rates. Another point of contention is that planners are using technology post-event to measure ROI, but they are having a lot of trouble implementing this data to make future programming better. Mike Mason, VP of sourcing and hospitality solutions with etouches (another event management platform) discusses a new tool that allows planners to measure attendee engagement but admits that firms need to build in a better support system for their clients.
  • Almost one out of two meeting planners today says that event technology is a primary pain point, according to a new study published by etouches.
    • rnobl005
       
      On one hand it's great that we have software that can assist planners, but it doesn't seem to be making their lives any easier.
  • “Planners cite poor transparency and accuracy over pricing, along with lack of clarity and poor response rates, as their main pain point with venue selection.”
    • rnobl005
       
      This is referring to the Cvent platform.
  • ...8 more annotations...
  • the overwhelming pain point for planners is the length of time it takes to receive responses from hotels for their digital requests for proposals (RFPs), and the often inaccurate and/or omitted costs supplied within those responses.
  • Post-event, 65 percent of planners say that they’re using technology to measure the overall return on investment (ROI), but at the same time, how they analyze and use that data to inform future event programming and design remains a challenge.
    • rnobl005
       
      This is referring to the etouches platform.
  • Toward that end, Cvent launched a new Group Business Intelligence tool this summer, designed to provide real-time data and analytics of hotels’ group business leads, and those of their competitors, in a single platform, helping hotel sales staff prioritize incoming queries and score leads.
    • rnobl005
       
      Hopefully this will make the RFP response process less overwhelming for the venue sales teams.
  • it’s incumbent on event tech firms across the industry to do a better job managing expectations and delivering the support necessary to help planners use technology more effectively.
  • we need to play a much more concentrative role in the process to help you benefit from it, because unless you benefit from it, and see the ROI, it’s just gonna be a pain in the butt
    • rnobl005
       
      This is a quote from Mike Mason at etouches.
  • With the exponential rise of digital RFPs, hotels are challenged with prioritizing the onslaught of proposals they receive, which is the root cause for the lengthy time it often takes to respond to planners.
  • Loopd integrates bi-directional wearable smart badges, a mobile event app, and a cloud-based analytics engine. When attendees are using the Loopd badges, which can transmit contact information and any other kind of digital content, event organizers can track how attendees are moving through the event, and which programming is most popular.
    • rnobl005
       
      This is a platform run by etouches. I would find this system really valuable if I were a conference attendee. It's a way for me to get the most out of the experience. However, a lot of this rides on the backend functioning properly.
  • The tool is also intended to make it easier for hoteliers to examine leads, dissected by specific time periods, customer segments, competitor rates, response times, and peak night volume, helping calculate the potential value of each piece of group business with more context and business insight than before.
marble_bird

Hotel_ITSec.pdf - 0 views

shared by marble_bird on 15 Jul 20 - No Cached
  • During the past decade, information technology (IT) has significantly changed the way the hotel industry controls and manages operations. While many technologies have been utilized, some newer technologies have emerged in the literature and in practice, and many of them impact the hotel’s security.
  • Among the results, this study identified a gap between hoteliers’ understanding of IT budget adequacy and the adequacy of installed IT security systems.
  • Advancements in technology are increasing at a remarkable rate. As technology becomes more important, organizations that do not keep up with these advancements could lose business opportunities to other competitors that do
  • ...53 more annotations...
  • The four leading technologies which have showed a high adoption rate from the industry and have received attention from academia are: self-service, wireless, green, and security technologies. The advantages of these technologies for hoteliers include enhanced customer services and operational efficiency (Doyle, 2007), decreased guest wait times, more efficient methods to settle bills (Singh & Kasavana, 2005), reduction of energy costs (Meeroff & Scarlatos, 2007), and protection of sensitive customer data and credit card numbers
  • In addition, exploring the influential factors of security system usage will provide greater depth of knowledge with respect to why some hotels have adopted more security systems than others.
  • there is still a lack of understanding of the nature of risk associated with inadequate IT security, especially among operators of hotels that do not have their own IT departments.
  • Self-service technologies are commonly defined as devices or applications which permit users to produce a service independent from the direct involvement of the service provider (Meuter, Ostrom, Roundtree, & Bitner, 2000). The use of self-service technologies in the hotel industry has grown considerably, especially in the areas of self check-in, in-room check-out, and foodservice kiosks
  • IT systems refer to general support systems such as mainframe computer, mid-range computer, and local area network.
  • Some of the most significant wireless technology applications involve the use of mobile handheld devices, such as personal digital assistants (PDA), tablet PCs, and cellular phones, or RFID (radio frequency identification). RFID utilizes computer chips and antennas, allowing the chips to wirelessly communicate with a receiver.
  • While the major usage of RFID in the hotel industry was for inventory control purposes, it also has the potential to be utilized in ways that can provide more conveniences for the guests.
  • Other possible uses include placing RFID tags on items of high value as a means of theft prevention or integrating tags into guest loyalty cards for easy identification
  • IT investment that lowers environmental impact and IT that manages the environmental impact of other systems are commonly referred to as “green technology”
  • Many hoteliers might think becoming more environmentally friendly will cost more for their hotels. However, it has been demonstrated that “going green” is not only the right thing to do for the environment but also provides tangible bottom-line benefits for hotels by reducing consumption of energy and water, as well as other related costs.
  • Some of the risk factors involved include reliability, security, and privacy issues
  • A hotel with more technologies being utilized will install more security systems than those with fewer technologies.
  • Many of these attacks involve attempts by thieves to gain access to customer credit card data, and these attempts constitute a major portion of the risk inherent in IT security
  • if a system is breached and the merchant is not PCI compliant, the merchant then is responsible for all costs associated with improperly used credit card information taken from that system (Kress, 2008). These losses could bankrupt a business if the security breach goes undetected for even a short time.
  • IT security systems are those measures taken to protect the confidentiality and integrity of proprietary data.
  • two main paradigms of adoption are believed to occur: bottom-up adoption and top-down adoption.
  • Thus, it is reasonable to assume that organizational factors (e.g., financial factor, human resource) will influence the implementation stage of security systems at a hotel.
  • A hotel with sufficient IT budget will install more security systems than those with insufficient IT budget.
  • That is, if a hotel does not have its own IT department, it will have a negative influence on successfully installing or maintaining necessary security systems.
  • A hotel with its own IT department will install more security systems than those without.
  • Overall, the state of IT spending on security continues undiminished because managed security services are required for almost every application (Communications News, 2007).
  • risk associated with a breach of IT systems security (e.g., network break-ins) is very high. Consequently, no sector of the business community is exempt from attacks on their IT systems, with an attack being defined as a technique used to exploit a system’s vulnerabilities.
  • Given the importance of security and privacy at a luxury hotel, this study expects luxury properties to have installed more security systems than other segments
  • Most hotel employees use their property management systems for hotel operations and should be able to check their e-mails.
  • To justify the low response rate, previous studies which have compared response rates of mail and e-mail for surveys were reviewed.
  • the large majority of respondent properties do not have their own IT departments. Second, the people making IT decisions generally do not have IT backgrounds or training. Third, the large majority of respondent properties have little more than firewalls or antivirus software to protect their proprietary data, and these systems alone are not adequate to meet PCI standards, as they do not take steps to encrypt and protect cardholder data, maintain a vulnerability management program, implement strong access control measures, regularly monitor and test their networks, and maintain an information security policy as required by the Security Standards Council.
  • The respondents were asked to select from a total of fourteen securities related systems
  • The profile of the respondents revealed that they were experienced hoteliers with more than ten years experience in the industry
  • Fifty-three percent of the respondents reported that they were with chain hotels that would be considered mid-range properties with an average of 175 rooms (median of 107). Over 80% of the respondents reported working in operations, while fewer than 4% reported working in either IT or engineering (Table 1).
  • Nearly 70% of the respondents’ properties did not have their own IT department (69.2% did not have, and 30.8% had their own IT departments, n = 234, missing data = 10).
  • Fifty-three percent of them (n = 244) thought the most important goal for hotel technology would be enhancing the customer’s experience.
  • second identified goal was utilizing technology to help generate revenue (41%)
  • differentiate properties from their competition (20%), to lower expenses (16%), and to increase security (6%).
  • Internet kiosks in the lobby represented the most frequently used self-service technology (36.5%, n = 244), followed by kiosks for airline check-in/board pass
  • With respect to security systems currently in use, antivirus security systems represented the most frequently used security system (92.2%), followed by hardware firewalls, software firewalls, physical security, and encrypted login security systems.
  • intrusion detection was the most frequently identified system (15.6%), followed by vulnerability assessment scanning (13.5%), Internet scanning (13.1%), antivirus (11.5%), digital ID server (11.5%), and nonreusable passwords (9.8%; Table 2).
  • Thus, the hypothesis was supported that there was a linear relationship between the three factors and the adequacy of security systems.
  • The positive standardized coefficient (β) of .389 indicates that there was a statistically significant (p < .001) linear relationship between IT usage (the number of wireless, self-service, and green technologies a hotel was using) and the adequacy of security systems
  • The study revealed certain things of interest, the most significant of which is the need for greater emphasis on IT security among hoteliers.
  • only about 30% of all respondents reported having their own IT departments. Since budget hotel properties are extremely unlikely to have an IT department, it is highly likely that the very large majority of IT decisions throughout the industry are being made by hotel operators for whom IT is not their primary area of concern.
  • Furthermore, the focus of hoteliers for future IT implementations is enhancing the guest experience (53%) and generating revenue (41%). Very few respondents (6%) identified increasing security as a 5-year IT goal.
  • While almost all respondents use information systems as part of their jobs, very few are trained in the development, maintenance, and secure use of these systems.
  • no correlation was found between the respondents’ perceived adequacy of their IT budgets and the adequacy of installed security systems, as adequacy of IT budget did not appear as a significant term in the regression analysis.
  • Nearly 10% of respondents do not have so much as anti-virus protection for their systems, and nearly half do not even take simple physical precautions to protect their IT systems.
  • we note that no correlation exists between the respondents’ perceived adequacy of their IT budgets and the number of installed IT security systems, as the number of installed systems was not a significant factor in the regression analysis.
  • The sample obtained in this study represented the targeted sample: over 80% of the respondents were working in hotel operations. Furthermore, the purpose of this study was to explore hotel operators’ insight of technology usage, IT budget, and security measures rather than to confirm existing theories or to generalize the results.
  • it is reasonable to conclude that the respondents did not have an adequate understanding of the nature of the IT security hazards facing them for the average property does not have installed systems adequate to meet PCI standards, yet they reported having adequate budgets.
  • In order to adequately protect proprietary data, one must have an understanding of network security, which is an understanding apart from software functionality.
  • Properties with their own IT departments, however, reported that they had a higher number of installed IS security systems than did those properties without their own IT departments.
  • roperties without their own IT departments, in particular, have a less adequate understanding of their IT security needs than may be necessary.
  • This study found hoteliers’ lack of attention to security provision, training in IT, and PCI compliance can place hoteliers at great risk. For example, the cost of a single incident at a noncompliant property could result in the loss of the entire business.
  • It will be useful to examine the reasons why luxury properties are more likely to employ adequate security measures to determine whether this greater use is attributable to better understanding of security issues or some other factor.
  • The study was limited by the nature of online surveys; the response rate was quite low. Future studies could test the proposed research model via paper-based mail surveys to increase a response rate.
  •  
    This article covers a study performed on various hotels to determine management's level of IT knowledge and security implementations in relation to the hotel's IT security budget. The article discusses four types of technology impacting the hotel industry and how management responses to trending technology can affect a business, particularly in terms of a data breach and overall security. The study finds that an alarming percentage of hotel managers are not adequately informed on the risks and procedures of IT management and security, and many do not have proper IT security measures in place despite having an appropriate budget.
Angelica Saez

Hotel Event Planner Roles & Responsibilities | Social Tables - 0 views

  • From the cleaning staff to the catering crew, you’re in charge of all the team members who make the event run smoothly.
  • So you’re going to need some great communication and people skills to shepherd such a large team, especially in the hustle-bustle of high-stakes situations.
  • No events, no job! That’s why planners in this role are also usually in charge of sales and marketing for the property’s event space.
  • ...11 more annotations...
  • Hotel event planners work with their clients to dream up and execute outstanding events that stay in budget and meet expectations.
  • That means you need detailed planning skills, a knack for delegating well, and above all, the ability to multi-task.
  • ou’re going to run plenty of other events that are at night or on weekends. Not to mention no one’s going to be covering for you.
  • From speakers that arrive late, to unexpected food allergies, or guests that didn’t RSVP – there’s always a little something to keep event managers on their toes
  • An event manager is responsible for all of the hotel’s events spaces including dining rooms, conference rooms, large ballrooms, and sometimes even concert venues.
    • Angelica Saez
       
      Being an event planner at a hotel you are responsible for all the hotel events and the event spaces in the hotel. It is important as an event manager to understand all your responsibilities.
  • After all the intensive and detailed planning is done, it’s game time. Event execution is about planning for every situation and implementing the in-the-moment fixes that keep your shindig running full-steam ahead. We’re not going to lie to you: Flawless events are time-consuming and can be high-stress.
  • That means you need to understand the particular features and possibilities that are unique each room. You’ll also have to lay things out and keep them running smoothly.
  • From answering incoming inquiries to networking at local professional events, pros at this position use their marketing and sales savvy to get their venue booked. But be prepared: Hotel’s don’t always have a large budget for print or online advertising. You have to be ready to go out there and shake some hands.
  • Event pros will tell you that the most trying part of the job is managing the unexpected issues that inevitably arise during events.
  • Working as a hotel event planner will introduce you to a wide array of events that’ll stimulate your creativity and test your skills. If that piques your interest, then it might just be the gig for you.
Yongjoon Ji

Social responsibility key for TownePlace - 0 views

  • As for the many properties that are not part of the LEED program, TownePlace Suites still requires LED light bulbs as well as energy-star ratings on all appliances. Motion sensors that control lights also are a standard in back-of-house utility closets, Nalewanski said. “When you think of how many utility closets we have back-of-the-house, that’s one of the last things the housekeepers have on their mind, so we make it easy for them.” Front of house, the brand has implemented a linen reuse program that requires housekeepers to change the sheets only two times per week if the guest stays that long, otherwise they are changed for every new customer, he said. Marriott, as a whole, is taking bigger steps this year to brand itself as a socially responsible corporation.
  •  
    Marriott Corporation set up an eco friendly program, which is called LEED volume program. Towneplace Suites is the main leader of this program and they created it because of they would like to teach and tell about what it really means to be social responsible. The goal of the program is to provide a pre-certified hotel design as green hotels. More than $100,000 can be saved per project and company will do all the work with owners pre-opening and post-opening. They usually focus on lighting and towel. They prefer to use motion sensors rather than regular light bulb and try not to change sheets and towels too often. They are some hotels trying to be green hotels but it is very rare that big corporation hotels try to be the one and lead industry. I believe it will bring positive effects to whole tourism and hospitality industry.
mrueda

HNN - Hotel industry explores voice tech, smart speakers - 0 views

  • Through the smart speaker, guests can request information, such as hours of breakfast or for the fitness center, and they’ll receive an immediate “canned” response, he said. For other more specific requests, such as asking for more towels or for a late check out, the platform converts the request through a tablet, which triggers hotels staff to respond accordingly and complete the request.
  • Hotel companies have begun switching over some requests that would normally go to a concierge, such as restaurant recommendations, to voice-activated smart devices, while some have gone a step further and let guests control lights, shades and the HVAC system, said Victor Idrac, project coordinator at HTNG.
  • tness center, and they’ll receive an immediate “canned” response, he said. For other more specific requests, such as asking for more towels or for a late check out, the platform converts the request through a tablet, which triggers hotels staff to respond accordingly and complete the request.
  • ...9 more annotations...
  • Through the smart speaker, guests can request information, such as hours of breakfast or for the fitness center, and they’ll receive an immediate “canned” response, he said. For other more specific requests, such as asking for more towels or for a late check out, the platform converts the request through a tablet, which triggers hotels staff to respond accordingly and complete the request.
  • fitness
  • many risks to accept and challenges to solve with new guest-facing technology.
  • “During the early adoption phase of any guest-facing technology, guest education is critical to utilization, experience and value,” he said. “Another equally important part is staff training, as implementation of voice-based solutions can impact the staff in a multitude of ways.”
  • Routine updates on the devices are a necessity, he said, and software updates should not only introduce new features but also fix any security bugs ore vulnerabilities that have come to light
  • Routine updates on the devices are a necessity, he said, and software updates should not only introduce new features but also fix any security bugs ore vulnerabilities that have come to ligh
  • The world is more and more connected to mobile devices, Pohl said
  • This technology will eventually be as commonplace as a television is in guestrooms, Idrac said.
  • Voice is one of the greatest emerging technologies of this decade, and hotel brands should get comfortable with this tech now, he said. Some brands that will come later to the game will need to listen to their customer base, he said
  •  
    This article discusses the never ending demand and growth of technology in the hospitality and tourism industry. The article specially discusses voice technology. Similar to the Amazon Alexa and Google Dot.  Many hotels across the United States have already implemented this technology into their guest rooms. According to the article, "it provides better tracking capability." Ron Phol SVP and COO of Best Western Hotel & Resorts.  A guest can put in a request through the voice technology and software is able to track the time it takes for a guest to receive a response back. This voice technology is still in its baby stages. So an extended amount of training and care is involved when introducing it to hotels, not only for the staff but also the guest.  There is also the concern of security breaches and down time that can slow down the day to day functions of a hotel.
sbarr011

Who takes responsibility for cyber security in a hotel? - 0 views

  • it is vital that franchisors and their corporate security teams communicate franchisees’ contractual duties;
  • It’s you who may need to ensure all policies are upheld, that’s why it pays to provide incentives that will make it worth franchisees’ while to comply.
  • The study also reported that the cost for each lost or stolen record containing sensitive and confidential information increased from an average of $154 to $158.
  • ...9 more annotations...
  • And, while there’s no definitive answer to who owns cyber security in a hotel franchise, hotel owners or franchisees can take measures, such as investing in cyber insurance and maintaining updated systems, to prevent a cyber attack.
  • there have been multiple data breaches in some of the biggest hotel chains, with 55% of data compromises resulting from a corporate/internal network breach.
  • If the lines are still blurred come May 2018 – when GDPR is implemented – hotels may not be compliant and will face strict penalties.
  • Last year’s Ponemon study found the average total cost of a data breach is $4 million.
  • Adding to the cyber security difficulty: most franchisees have multiple properties, each with their own brands and contracts, making it even more important for cyber security policies to be implemented and upheld.
  • However, currently, too many hotel owners rely heavily on central reservation systems; thus, they don’t have much, if any, involvement in data collection or storage. That makes it difficult to implement an effective cyber security policy.
  • Many of the vulnerabilities are due to a gap in hotel franchise’s cyber security responsibility.
  • Unfortunately, this industry is a popular target for attack, because of the type of data it holds – credit card data, frequently used throughout the hotel either at check-in, in bars, restaurants, or shops – as well as relatively poor cyber security.
  • According to a recent Trustwave 2016 Global Security Report, the hospitality industry accounted for the second largest share of data compromises among any other last year.
  •  
    This article discusses the liability for a cyber breach at various branded hotels between the franchise owner or the corporation. The Trustwave 2016 Global Security Report stated that the hospitality industry had the second largest amount of data breaches. Additionally, more than half of the breaches are from a corporate/internal network breach. According to a Ponemon study, the average cost of a data breach is $4 million. While this is alarming, it is a surprise since hotels store numerous amounts of personal customer data including guest's credit card information. The article states that cyber hacks are largely due to the gap in not knowing who is responsible for the cyber security. There is an issue of control of data versus franchise network requirements. The hotel brand places individual franchisees in control of their own cyber security. However; they must rely on many centralized corporate owned reservation systems that could be possible access point for cyber attacks. The article suggests that the individual franchisee should make more effort in protecting their customers information as the hotel brand will take most of the blame. This does not help either side. Also, it mentions that in order to protect the hotel franchise it is important to have updated systems and should consider investing in cyber insurance.
natyangel

How IT Can Go Green | Top Stories | | Hospitality Magazine (HT) - 1 views

  • In the world of information technology (IT), the green movement is taking shape.
  • Technology is a tool to provide solutions, but regrettably, technology can also be a source of the problem due to factors like energy consumption and the environmental impacts when disposing of obsolete or broken technology (i.e., e-waste).
  • Like any business initiative, green IT projects will require strong commitment from an organization’s top management and investment in time and resources at all levels.
  • ...13 more annotations...
  • Clearly, hotels and resorts are in the business of making money, but they must do so in a conscientious manner
  • The environmental focus is here to stay and must be embraced.
  • The focus on sustainability or "going green" is quickly becoming a major trend. But let’s face it, being environmentally conscious is the right thing to do, and it should be a business imperative for everyone. After all, a significant portion of the hospitality and tourism industries rely on the natural beauty and desirability of destinations: beach resorts, mountain ski lodges and canyon-land ranches
  • Using IT responsibly and effectively to reduce energy, water and paper consumption: Energy management systems are effective at controlling guest comfort while saving energy consumption and costs.
  • There are numerous opportunities for IT professionals to take leadership roles in helping their organizations to adopt sustainable practices.
  • Deploying effective technology practices such as Energy Star compliance to power down computers automatically after periods of inactivity and server virtualization: This means having applications which share a common server rather than each application hosted on a separate server.
  • Tackling e-waste and deploying recycling technologies to reduce environmental waste and impacts: Many electronic firms offer responsible recycling programs for used hardware. Technology can also be utilized to assist in the recycling process
  •  Digital marketing practices: Using digital media instead of print media is a great way to save money while reducing the impact on the environment. By tapping into social media, you can let guests be involved in green practices and spread the word virally about all the good the organization is doing
  • There is a growing environmentally conscious market, a profitable segment to tap
  • .    Educate employees and guests to improve awareness of environmental issues and green practices in your organization and the industry.
  •    Conduct an energy audit to see where and how energy is being consumed and to establish a baseline. Continue these audits on a regular basis.
  • Seek suggestions from employees and guests, and offer rewards for ideas that get implemented.
  • Celebrate and market key successes
  •  
    This article emphasizes the positive and negative aspects of the hospitality industry adopting to sustainable practices. It recognizes that this industry is in the business of making money, while appoints the importance of doing so conscientiously, respecting the environment. It shows the steps that the organizations should take on its journey to action. I believe that sustainability should be a business imperative and not a lifestyle choice, as the sustained interest among consumers in tourism products and services are continuously increasing. That should be beneficial for the organization, positively affecting the operating revenue.
  • ...2 more comments...
  •  
    The articles describes, how technology helps a hospitality firm in conserving non renewable resources. It focuses on sustainability of hospitality industry. The article describes one interesting point, educate the employees and the guest, employees and guest are the pillars of any hotel. If they understand the concept of going green, it would be easy for the organization to conserve energy. use of E marketing by the hotels has reduced the use of paper, which mean many trees are being saved from getting cut. Use of recycle bins by the firms makes people aware of the waste which an be recycled should be disposed off separately. The use of tablets in the rooms is another way which the hospitality firms have adapted to go green, it not only saves paper but also gives a new amenity in the rooms.
  •  
    The emphasis on sustainability and going green is everywhere, including hospitality and tourism industries. Within the scope of information technology, there are numerous opportunities to becoming greener and more sustainable both in the short and long term. First, using IT responsibly and effectively to reduce energy, water and paper consumption are advantageous and can also be seen as consumer driven. For instance, if a hotel offers a guest the convenience of controlling temperature through their smartphone or using their smartphone as the room key, not only is the hotel becoming greener but also the guest will appreciate these value added features. Instilling technology practices such as Energy Star compliance will lead to less consumption. Additionally, addressing the issue of e waste and creating recycling technologies to reduce environmental waste and impact adds on to the sustainable strategy. Lastly, with the growing environmentally conscious effort, creating marketing strategies to promote green practices improves the company's image, increases awareness on becoming more sustainable, and educates the public on becoming greener. It takes time, as employees need to be trained in order to become aware of environmental impacts (such as printing less paperwork and shutting off a printer when idle), track energy consumption, and instill these behaviors on a day to day basis. According to this article, it was noted that " for many guests, particularly Millennials, environmental stewardship is a key topic that resonates with them. It has become one of the decision-making criteria used to select companies in which they do business, including hotels and resorts". I believe that sustainability and the promotion of green practices is not a fleeting trend, but rather it is a change in mindset in which younger generations appreciate this adopted conscientious value.
  •  
    The article discusses the many ways the IT world is finding new ways to be sustainable in the hospitality industry. Changing the way a hotel runs by introducing e-mails to guest and other companies to reduce the paper flow or allowing guest to do mobile check-ins can reduce a lot of paper waste. Also, having guest use their phones as key cards for their rooms can aid in avoiding wasting and needing to create key cards. By hotels having an energy saving system, they reduce electrical waste by having computers on low power consumption mode. One main thing the article mentioned that I personally see a lot of hotels doing is digital advertising. Instead of relying on paper advertisement, hotels rely heavily on ads on social medias, facebook, google, and third party vendors.
  •  
    This article discusses the IT green movement that has been in action since the rise of technology and ways on how IT can go green. Some opportunities in the green IT movement include the following: - Using IT responsibly and effectively to reduce water, energy, and paper consumption. This gives IT teams to take advantage of a few technical enhancements within their hotels to provide key cards available on smart phones, email to reduce paper, and digital signage. - Deploying effective technology practices such as Energy Star compliance to shut down computers automatically after periods of inactivity and server virtualization. This would mean for everything to be on one common server, and companies can save money on computer hardware and power consumption. - Tackling e-waste and deploying recycling technologies to reduce environmental waste and impacts. This could be implementing by introducing a safe recycling system for used hardware. - Digital marketing practices. This could be like using digital media to save money or using social media to encourage guests about the green practices that the hotel is implementing. - Marketing strategies to report and promote green practices. This could be having the business properly use marketing strategies to target these environmentally conscious market and find ways to promote green practices to this market segment. These are all very effective ways for IT teams to go green within their hospitality businesses. These green IT projects will need approval from top management and investment in time and resources.
anaslip

Meeting the Threat in 2019: Cybersecurity for the Hospitality Sector | Hospitality Tech... - 0 views

  • Meeting the Threat in 2019: Cybersecurity for the Hospitality Sector
  • Marriott International revealed that a massive cyberattack compromised personal information for up to half a billion individual guests of its properties.[1] The data breach ranks as the second largest known theft of sensitive personal records to date.
  • This marks the second major cybersecurity failure for Starwood, the Marriott division affected. Before being acquired by Marriott in 2016, the company’s cash register system was penetrated by malware looking to steal credit card information. [3] Other major organizations in the hospitality industry, including Hilton and Hyatt, have reported similar attacks. In 2017, for example, Holiday Inn parent company InterContinental Hotels discovered a breach lasting three months and affecting 1,200 properties. With a reputation as less well guarded than similar institutions, hospitality companies are a popular target for cyberattacks.
  • ...5 more annotations...
  • Experts warn other hackers, like those working for a nation-state, could exploit hospitality breaches like Marriott’s to acquire details on the travel and spending habits of espionage targets, like CEOs and diplomats.
  • However, industry specific challenges like high employee turnover continue to expose the sector.[6] Additionally, even by adopting cutting-edge cybersecurity technologies, the important question of strategic implementation remains.
  • Traditional cybersecurity approaches are focused on reporting about intrusions after the fact, in what is known as an “incident response.” What this means is that an adversary—commonly referred to as a “hacker”—finds some way to gain access to a target and compromises it. The target can be accessed through vulnerabilities in web frameworks, internet browsers, or internet infrastructure such as routers and modems. Regardless of how they gain access, once an attacker is discovered, the forensics about the attack, including basic information known as Indicators of Compromise (IOCs) like IP addresses, domain names, or malware hashes, are shared across the cybersecurity community. These IOCs are then used broadly to thwart future attacks.
  • Rather than rely solely on the incident response and recovery methods that have been used for many years, a more proactive, sophisticated approach is needed. It will need to be designed to successfully recognize adversary methodology (and all the manners in which an adversary attempts to obfuscate their methodology) before attacks occur and at a meaningful scale. This kind of approach, when paired with incident response tactics, could provide true security to vulnerable, critical networks.
  • A TTP-based cybersecurity tool would work in concert with existing incident response, internally-focused cybersecurity efforts, adding a layer of prevention over the top of this vital but flawed process.
  •  
    In today's world no business entity is impervious to cyber-attacks. Marriot, Hilton and InterContential Hotel Groups were all recently affected by such acts. The traditional cyber-attack method which the hospitality industry employs is oftentimes simply a reaction to the attack- "incident responses". Instead, the industry needs to shift its focus and allocate resources to aid prevention of future of attacks. This new focus was be surrounding tactics, techniques and procedures (TTP) - the ability to identify adversary and implement the necessary processes to hinder attacks.
  •  
    This article tells us about the importance of having a good cybersecurity. There are some big hospitality companies like Marriott and Hilton which have revealed that many cyberattackes compromised personal information for many guests and that cybersecurity has to be improved.
svail001

Understanding the Security Risks of Your Hotel's PMS Data Hosting Environment | By Warr... - 0 views

  • Data security has come under greater scrutiny for all businesses in recent years, with larger fines and penalties being awarded for contemporary data breaches.
  • Forming relationships with your network administrator is key because every partnership in this arena is unique
  • Protecting your guests’ data is equally important as preserving their physical safet
  • ...14 more annotations...
  • There are two components of the puzzle: the booking engine used by hotels, and the actual PMS
  • Understanding how your hotel accesses and stores guest data is key to understanding their liability in relation to that data
  • Hosting your hotel's online booking engine comes with an extensive investment into web server technology
  • work with third parties to host their booking engine off site. However, even if your hotel's data is out of sight, it is a hotel's responsibility to keep their data partners accountable
  • Request information on the hosting facility’s certifications for GDPR, PCA, SOC 2, and others.
  • Choosing the right partner and hosting environment for your property can be complicated, but the property-management system (PMS) selected will play a critical role in securing your confidential data
  • data storage and security for hotels could be mostly automated, or hotels could be expected to manage several processes on their own
  • No matter how a hotel stores its data, operators will always be liable for securing it on some level.
  • Partnerships of any kind also do not absolve hotel operators from managing their local network
  • data services have tenants, like the housing market, and it pays to know if you have neighbors or not. Businesses have the option to invest in either a dedicated or open hosting environment,
  • Dedicated hosts allow for updates to roll out in coordination with operators’ decisions, keeping it autonomous and allowing for proper scheduling and preparatio
  • The other option, where multiple businesses share a single server host and single application instance, is a more hands-off proposition
  • but when an update is rolled out by the host it is done to every company on the shared server environment, whether your property is prepared for it or not. Surprise updates such as these can potentially impact operations, or other aspects of your business.
  • The hosting environment for your PMS and guests’ data should provide you with confidence through open and clear communication, vendor commitment and choice of options that best suit your specific independent needs
  •  
    This article discusses the important issue of data security especially when it comes to a hotel's PMS. It goes into two areas of particular vulnerability: the booking engine used by hotels and the actual PMS. By hosting a 3rd party booking engine off site, it is still the responsibility of the hotel to secure and keep guests' date secure. They need to ensure that their partners are adhering to proper compliance and rolling updates for security. The second area of focus is the PMS itself and how it is hosted: whether locally or through a cloud based system. Regardless of the location of the host, data security is the responsibility of the hotel.
yongwei hao

Physical Plant Engineer Salary | eHow.com - 0 views

  • Physical plant or mechanical plant engineers can be found in almost every business sector and industry and are responsible for maintaining large facilities. These individuals usually monitor their facility's heating, cooling and ventilation systems.
  • Additionally, physical plant engineers must also service and repair their facility's plumbing and lighting.
  • Physical plant engineers are paid an average salary of at least $50,000 to make sure a plant's systems run safely.
  •  
    Physical plant or mechanical plant engineers can be found in almost every business sector and industry and are responsible for maintaining large facilities. These individuals usually monitor their facility's heating, cooling and ventilation systems. Additionally, physical plant engineers must also service and repair their facility's plumbing and lighting. According to 2010 data published by the U.S. Bureau of Labor Statistics, the national annual mean salary for a stationary engineer was $52,620. These individuals earned a national mean hourly wage of $25. Physical plant engineers, stationary engineers and boiler operators have a strong background in mechanics. Individuals working in this field often receive formal apprenticeship training with the International Union of Operating Engineers or formal education through vocational or trade schools. Certain states may require licensing for positions in this field. Generally, employers prefer to hire people with at least a high school diploma or GED who have experience in the field.
  •  
    "Physical plant or mechanical plant engineers can be found in almost every business sector and industry and are responsible for maintaining large facilities. These individuals usually monitor their facility's heating, cooling and ventilation systems. Additionally, physical plant engineers must also service and repair their facility's plumbing and lighting. Physical plant engineers are paid an average salary of at least $50,000 to make sure a plant's systems run safely. "
Yingjie Cao

Cutting-Edge Audience Feedback - Meetings And Conventions - 0 views

  • Audience-response systems (ARS) have become more sophisticated and portable, allowing presenters to ask questions on the fly and attendees to get involved in a program's content.
  • You can use it for surveys and evaluations. You can use it to engage attendees. You can use it for gaming. You can collect valuable information that you can publish after the event. You can grab it all with one tool
  • Devices also can be individually assigned to attendees to count attendance for crediting purposes
  • ...4 more annotations...
  • the IML Connector has a more powerful microphone, eliminating the need for a fleet-footed helper to run the mike around the room. An extra feature is a speaker, allowing attendees to listen to simultaneous interpretation through the handset or headphones.  
  • No computer is needed when the devices are paired with the handheld base unit, called the Reply Solo, which gathers the answers and displays the results.
  • Each transmitter has a small LCD screen that indicates which answer the attendee has chosen.
  • As long as Wi-Fi is available, responses to Poll Everywhere surveys also can be sent in by laptops, iPads and iPod Touches. And answers can be tweeted and still come straight into the presenter's PowerPoint slides in seconds
  •  
    Technology absolutely plays important role to facilitate meetings and conference running smoothly. The Audience-response systems (ARS) ease the communication between attendees and speaker, which encourages the engagement from participants. As one big goal of meeting and convention is to bring people together and let them know each other, technology like ARS is essential for a successful meeting. According to most planners' experience, it's really annoying to pass around the microphone when somebody wants to ask question. The new microphone function is also added into ARS so that attendees can ask question without waiting for passing the microphone. In addition, ARS can track attendance for crediting purpose. As long as WiFi is available, surveys can be sent by laptops, iPads and iPod touches.
1 - 20 of 555 Next › Last »
Showing 20 items per page