Skip to main content

Home/ Hospitality Technology/ Group items tagged systems.

Rss Feed Group items tagged

Disruptive Innovation - 0 views

started by ortiz004 on 12 May 22 no follow-up yet
1More

Cloud Computing: Travel and Tourism Trends - 0 views

  •  
    This article describes the various cloud computing trends in travel and tourism and how they could be beneficial for all travel companies to adopt. It further goes into detail on how cloud computing is becoming utilized by approximately 81% of the travel & tourism companies and how it creates a positive impact on the industry. It mentions the advantages that cloud computing brings to the table like a personalized experience for users as it facilitates data synchronization between channels, is more reliable than holding one singular framework so it lessens the security risks, is being more widely utilized on a global scale, provides scalability and flexibility throughout the peak season and low seasons, saves the company potential expenses that would have otherwise been spent on other infrastructures, software, systems, etc., and benefits tourism on a socio-economic degree which helps fight environmental degradation.
1More

Cloud Computing and the Hospitality Industry - Insights - 0 views

  •  
    I found this article about cloud computing and the hospitality industry on the website eHotelier. The article focuses on the hospitality industry's unique relationship with technology. Technology has helped the hospitality industry grow throughout the years. With technology, the hospitality industry can offer better services to its customers, and technology also helps develop the tourism industry. The hospitality industry has included technology innovation as it continues evolving with better technology. For example, hotels can now handle information on internal servers and record customer visits through bookings and in-house data systems. Nowadays, hotels are now using cloud computing because it is inexpensive, provides an accessible service, offers faster service and stronger security, and reduces service and cost because it can be flexible when it comes to business demands. Cloud computing in the hospitality industry is very helpful because the services are faster and more efficient. It decreases wait times, which is valuable for offering customer services and customer satisfaction. Customers can have a more personalized service upon arrival or when checking out. The hotel staff also be aware of guests' room preferences, food, activities, and everything the guest likes before arriving on the premises. Hotels can also partner with travel agencies through the cloud because it offers the opportunity to share applications of data-sharing services. In addition, the cloud also has the benefit of reducing workforce and administration tasks.
11More

Are hotels and outdoor concerts any safer since the Las Vegas attack? | PBS NewsHour - 0 views

  • By now, many details of that October evening in Las Vegas are well known: the lone gunman in a 32nd floor suite atop the Mandalay Bay Hotel, the arsenal of firearms, the terrified concertgoers below.
  • For the first time in Coachella’s 19-year history, organizers used surveillance drones to monitor the vast grounds of the festival.
  • A separate Gallup poll taken days after the Las Vegas shooting found that 39 percent of Americans are “very” or “somewhat” worried that they, or a loved one, will be a victim of a mass shooting.
  • ...7 more annotations...
  • The Las Vegas attack was, however, the first mass shooting at a hotel in the U.S., and it served as a reminder that attacks on entertainment events are a worldwide emerging threat
  • The attack Paddock carried out — from a hotel with robust security and a state-of-the-art surveillance system — left many industry insiders and security experts stunned.
  • In a 2017 Gallup poll, 38 percent of U.S. adults said they were less willing to attend events with large crowds out of concern the events could become a terrorist target.
  • For months ahead of the festival, a security company called Emergence also trained Goldenvoice security and police officers in “predictive threat analysis,” a security technique that focuses on spotting signs of trouble and disrupting attacks before they take place.
  • And as security costs for hotels and event promoters increase, concertgoers in the U.S. may see slightly higher ticket prices
  • Police say Stephen Paddock planned his attack in Las Vegas at least a year in advance. In the days leading up to the shooting, Paddock was able to bring more than 23 rifles into his hotel room, set up a hidden camera in the hallway outside of his room, and drill L-brackets into the 32nd floor stairwell door and his suite to delay police from entering.
  • After the shooting, Wynn Resorts, Hilton and Disney Resorts all changed their internal policies regarding do-not-disturb signs
  •  
    High profile hotels near large events have had to respond to events such as mass shootings since the 2017 Las Vegas attack where a guest used as hotel room to carry out the shooting. Concert venues and large hotels are now using surveillance drones and predictive threat analysis to enable their staff to recognize patterns that could indicate signs of trouble. Security costs at large venues are expensive, and they are being passed on via ticket prices. Hotels need to evaluate their need for an active shooter plan and evaluate their "do not disturb" policies and train their staff to alert management when they are unable to enter a guest room, or when they recognize something out of the ordinary.
23More

Electronic Waste Is Becoming a Global Environmental Problem | Time - 1 views

  • s a tech-hungry nation flush with cash gets ready to upgrade to the next generation of lightning-fast 5G devices, there is a surprising environmental cost to be reckoned with: a fresh mountain of obsolete gadgets. About 6 million lb
  • Workers with hammers hack at the bulkiest devices, while others remove dangerous components like lithium-ion batteries
  • That cycle of consumption has made electronics waste the world’s fastest-growing s
  • ...17 more annotations...
  • “In our society, we always have to have the new, best product,” said Aaron Blum, the co-founder and chief operating officer of ERI, on a tour of the facility
  • 5G promises faster speeds and other benefits. But experts say it will also result in a dramatic increase in e-waste, as millions of smartphones, modems and other gadgets incompatible with 5G networks are made obsolete
  • But less than a quarter of all U.S. electronic waste is recycled, according to a United Nations estimate. The rest is incinerated or ends up in landfills
  • Environmental concerns aside, compacting flammable lithium-ion batteries with paper recycling can be dangerous; recycling centers have reported an uptick in fires
  • Even when e-waste rules exist, it’s left up to consumers to handle their old devices prop
  • ly. But recycling them can be a
  • We don’t necessarily have the measures to make sure people aren’t throwing it away,” Walters said.
  • One solution is to make electronics last as long as they once did. At ERI’s facility, Shegerian showed TIME dozens of televisions from the 1970s and 1980s that stopped working only recently
  • Our products today don’t last as long as they used to, and it’s a strategy by manufacturers to force us in
  • o shorter and shorter upgrade cycles,” said Kyle Wiens, the founder of iFixit
  • Some environmental groups say multibillion-dollar companies like Apple and Samsung should pick up the cost of recycling the devices they sell. Lawmakers in parts of Europe and Canada and in some U.S. states have passed so-called Extended Producer Responsibility (EPR) laws, which require manufacturers to establish and fund systems to recycle or collect obsolete products
  • Even so, some companies are increasing their recycling efforts on their own, whether for the economic benefit or the public relations boost (mining fresh materials has financial, environmental and human costs of its own). For instance, Apple in 2018 introduced Daisy, a smartphone-recycling robot that can take apart 200 iPhones every hour, and says it diverted 48,000 metric tons of electronic waste from landfills that year
  • About 6 million lb. of discarded electronics are already processed monthly at recycling giant ERI’s Fresno plant.
  • Americans spent $71 billion on telephone and communication equipment in 2017, nearly five times what they spent in 2010 even when adjusted for inflation, according to the Bureau of Economic Analysis. (Apple alone sold 60 million iPhones domestically last year, according to Counterpoint Research.)
  • That stream is expected to turn into a torrent as the world upgrades to 5G, the next big step in wireless technology.
  • Part of the problem is regulatory. Only 19 states have laws banning electronics from the regular trash. In states without such rules, like Nevada, electronics often end up in garbage and recycling bins, said Jeremy Walters, a community-relations manager for waste collector Republic Services
  • Our products today don’t last as long as they used to, and it’s a strategy by manufacturers to force us into shorter and shorter upgrade cycles,”
  •  
    Advancement in technology every day has led to the dumping of electronic gadgets no longer wanted to the environment. Heaps of unwanted electronic waste, hazardous containing substances like lithium-ion batteries, are dumped into the ground with all their toxicology. As the world upgrades to 5G, it will end in a rapid surge in e-waste. According to John Shegerian thinks people are yet to see the magnitude of the transition to 5G, it is tremendous than changing from analog to digital (Samuels & Calif, 2019). However, it comes with many advantages; its outcome is a drastic rise in electronic waste. The ERI recycles less than a quarter of the United States' e-waste according to the estimate made by the United Nations, and the other dumped in landfills. This waste contains harmful metals such as beryllium and mercury, that have adverse environmental dangers. Among the 50 states in the United States, only 19 States have imposed a law to bun electronics from regular trash (Samuels & Calif, 2019); the rest of the states, like Nevada they are incorporated in recycling and trash bins, according to Jeremy Walters's manager for waste collection. The consumers are left to handle their e-waste even though there are e-waste rules. Multibillion companies should the responsibility and cater for the cost of recycling for the products they are manufacturing. Companies like Apple and Samsung, nonetheless the United States is repelling modifications to the prevailing laws, according to Scott Cassel Product Stewardship Institute found. However, some companies are improving through increasing their recycling efforts. For instance, Daisy, a recycling robot introduced by Apple, can collect more than 200 iPhones for recycling every hour. But this is not enough since e-waste generated annually globally is more than we can imagine, which almost 50 tons (Samuels & Calif, 2019). In a nutshell, technology can bring many benefits to society. Still, it can also harm both the environment and the p
  •  
    the article explores the dangers of elctronic waste and give suggestions on how to better monitor this issue and resolve.
  •  
    This article explains how the rapid advancement of technology has impulsed an increase in the use of technology, however has resulted in a rise in ewaste percentage. This happens because companies have opted for creating products that do not last for long periods of time, since they want to sell future products.
13More

Sustainable Hospitality Technology Made Possible - CiHMS - 1 views

  • Sustainable Hospitality Technology Made Possible
  • the tourism sector can be harmful to the local environment due to the excessive tourist demands resulting in a large number of plastics & food wastes, overuse of water and energy supplies, and the social life of the local communities.
  • The fast-paced technology development has eased hospitality in making strides to becoming eco-friendly without leveraging the heavy financial burden. In order to transform into a green industry, hospitality has been gradually tapping into certain tactics to keep up with the sustainable bandwagon:
  • ...9 more annotations...
  • Forgoing daily cleaning
  • With the integration of a motion and temperature camera detector, the central AC system automatically adjusts the hotel’s overall temperature to maintain at a certain level instead of manually setting your AC temperature to a specific degree permanently.
  • Smart energy and water-saving management.
  • Acknowledging your guest in opting out of the daily cleaning properly by rewarding incentive loyalty points or discount vouchers to other hotel facilities would lead to massive cost savings and environmental benefits.
  • Digitize the use of paper
  • Eliminating all menus, reservations, program flyers, and other hotels in-room compendiums and replacing them with a digital guest room tablet or a large touch screen interactive monitor at lobby area would dramatically reduce the number of paper, cardboard, and plastic waste in hotels operations.
  • Effective food waste management
  • The recent technology helps the kitchen come up with an ultimate menu that achieves wasting food supply by tracking records on kitchen waste on a daily basis.
  • Receiving centralized reports to keep you in check for multiple properties in real-time, accessible from anywhere anytime, and trouble-free integration with other hospitality software via Open API are the benefits of a cloud-based hospitality management solution.
  •  
    This article on "Sustainable Hospitality Technology Made Possible" gives detailed tactics on how properties can lower their energy and consumption costs, and reduce waste which ultimately leads to protecting the environment. As explained in the article, this sustainability shift did not occur overnight, but rather through a progressive process that encompasses corporate social responsibilities and consumer sentiment.
4More

How to Use Facial Recognition for Hospitality - 1 views

  • s. For example, the software stores customer payment methods and loyalty memberships which means staff and patrons don’t need to handle cash or cards to pay a bill or collect benefits.
  • Facial recognition technology can save a tremendous amount of time at check-in. For instance, travelers can simply use their face to verify identity without needing to take the time to provide physical documentation.
  • Facial recognition, on the other hand, provides frictionless access to rooms via a smart lock on the door. Also, guests who use hotel facilities, such as a restaurant or spa, can easily update their tab via contactless facial recognition technology, which enhances the customer experience.
  •  
    Facial recognition and the use of biometrics are going to be essential in the future. This article outlines several ways it can impact the hospitality industry in a positive way. The most interesting has to do with F&B capabilities. This system linked with AI will be able to streamline restaurant ordering and payment.
15More

Developing an eMarketing model for tourism and hospitality: a keyword analysis - ProQuest - 0 views

  • Advances in IT have prompted the hospitality and tourism industries to move in a new direction, i.e. internet marketing or eMarketing (Leung et al., 2015)
  • On the other hand, from the customer perspective, tourism and hospitality are an information-intensive consumption experience because a customer might make considerable efforts to collect information and understand the image of a travel destination before making a purchase decision (Kim and Law, 2015). In this regard, search engines and social media are two of most fundamental information sources for making such decisions (Xiang and Gretzel, 2010). With their information-sharing capability, social media empower customers, granting them a “democratic consumption culture” by reducing information asymmetry and increasing their bargaining power (Leung et al., 2013). The pervasiveness and powerful computational capability of mobile technology make it possible for tourists to easily access information, book online services or even make impromptu purchases (Kim and Law, 2015). Apparently, the tourism and hospitality industries have been facing a revolution that has arisen largely because of IT turbulence (Piccoli, 2008).
  • Studies suggest that IT plays a prominent role in the tourism and hospitality industries, and it will be imperative, and indeed beneficial, for tourism and hospitality practitioners and scholars to keep abreast of all the advances in IT
  • ...11 more annotations...
  • Correspondingly, the frontiers of IT-related research will not only benefit the innovation and encroachment of the industry but also support managers, researchers, policymakers and other interested audiences in understanding the progress of developing trends and themes in the context of IT development
  • Among these analyzes, the keyword co-occurrence network particularly aims to construct knowledge, as the keywords of an article are anchored by the authors to distill the core concepts of a paper. Keywords generally represent the main idea of a research paper and express authors’ understandings of their work within the thematic context of their research domains (Ali et al., 2019). Keywords are regarded as one of the most meaningful indicators of an article’s content (Weismayer and Pezenka, 2017). Although keywords indicate the topic area and key variables/theories used in a study, they do not convey key findings such as the causal relationship between two keywords. Nevertheless, a group of keywords from the same domain creates an intellectual knowledge map of that realm. A knowledge map is generated from keywords according to the following steps
  • Keywords are collected from journal articles. A network of these keywords is built. A knowledge map connects the same keywords in different articles. A complete knowledge map is formed when all articles undergo the previous three steps.
  • eMarketing Capability As this study’s model of eMarketing capabilities is a major contribution and these capabilities play a critical role in marketing performance, future studies can investigate the antecedents/consequences of eMarketing capability, develop a scale or investigate the formation process of this construct. Future studies might validate the proposed model-based either on a single eMarketing capability or on multiple eMarketing capabilities. Empirical studies could benefit the development of research concerning eMarketing tourism and hospitality.
  • 3. Methods3.1 Data collection
  • 3.2 Data processing
  • 3.3 Analysis process and tools
  • Emerging Digital Technologies The purpose of this study is aimed at understanding the impact of IT on tourism and hospitality. However, as IT continues to evolve and advance, and as new technologies often alter customers’ behavior, as well as firms’ marketing strategies, it is necessary to pay attention to the impact of new digital technologies on focal fields. Specifically, it could be interesting and promising to explore the impact and role of forthcoming digital technologies in different eras, specifically, artificial intelligence, machine leaning, AR, virtual reality (VR), mixed reality (MR), chatbots, robotics, blockchain, 5 G or the internet of things (Park et al., 2018; Tung and Au, 2018).
  • As the database contains journals from various domains, this study first identified the target journals by using the keywords “travel,” “tourism” and “hospitality,” identifying 24 journals. Next, as these journals are affiliated with different publishers, the keywords “IT*,” “IS” and “technology*” were input to search ICT-related articles on the official website of each journal from its first issue to April 2020.
  • Customer Equity and Engagement Value Customer equity and engagement value are two of the crucial variables that require a better understanding in the eMarketing tourism and hospitality research. With the application and support of advanced IT and quantitative mathematical models, it will be valuable for future work to explore all aspects of the factors that influence customer experiences over time to synergize and maximize customer equity and CEV for DMOs or hotels.
  • Marketing Performance Apart from loyalty, other marketing performance indicators including financial and non-financial ones are encouraged to be developed. Such work will contribute to both the tourism and hospitality academia and allow industrial managers to link financial performance with innovative IT in terms of profit, sales revenue or cash flow. Moreover, assessing non-financial marketing performance (market share, quality of services or CEV) will help researchers and managers better understand the predictors of future financial performance than traditional accounting measures have in the past, and it should also supplement financial indicators in internal accounting systems (Ittner and Larcker, 1998). Finally, it will be contributory to develop a combined indicator linking financial and non-financial measures. Table 4 summarizes the overview of future research avenues.
  •  
    This article is about how hospitality and tourism have been reshaped through IT, eMarketing and how it has helped prove sales, information, made destinations more popular and also help travelers plan. eMarketing also is a massive platform for word of mouth. This study also shows what helped eMarketing become what it is. When certain things are typed into search bars, this data is collected and used for eMakreting and to target specific groups of people.
42More

Green IT | Green Hotelier - 2 views

  • Reducing energy, emissions and waste are concepts that have been around for many years, but one area that is often overlooked is information technology (IT).
  • it was estimated that 360 million computers were manufactured.
  • quiring over 10 times its weight in fossil fuels to make.
    • cleon087
       
      Computers waste a lot of energy and parts
  • ...30 more annotations...
  • 22kg of toxic chemicals, 240kg of fossil fuels and 1,500 kg of water.
  • consuming 15% of the total electricity used in offices
  • 50 million tons of e-waste was generated worldwide, but only 13% was recycled. US Environmental Protection Agency
  • Reusing working computers is up to 20 times more energy-efficient than recycling them
  • hich utilises the naturally cool environment below ground to reduce power consumption, and increase energy efficiency.
  • o date, more than 28,761 IT assets have been recycled (waiting for latest stats), which equates to 629,408lbs of e-waste diverted from landfill.
    • cleon087
       
      I wonder where is the recycling actually taking pace
  • Big hotel companies have wised up to the costs involved in operating inefficient hardware and are driving system changes to cut wasteful expenditure.
  • nt. A data centre’s life expectancy is relatively long so it is imperative it is built to the highest standards in terms of efficiency as any excess energy use will lead to significant cost implications over the years.
  • most energy-efficient data centre possible.
  • Get the right equipment.
  • Only get the data storage capacity that is currently required and forecast for the lifespan. Many d
  • Don’t have servers or equipment that will not be used.
  • , such as water cooling.
  • Data centres last 30-odd years and you can’t go back in and fix them, so they need to be efficient. Over time, this saves money as they run efficiently. Servers have to be Energy Star-compliant or I won’t even talk to vendors.”
  • cloud computing
    • cleon087
       
      We discussed this in class about the benefits of it.
  • e. Once you know what’s using the power, focus on why and whether it’s possible to reduce consumption. Spotlight on Fairmont Hotels & Resorts - T
  • into account not only the initial outlay cost of hardware, but also the running costs.
    • cleon087
       
      It's not only important to know the start up cost but what it cost to maintain it.
  • e up to 30% more energy, making it significantly more expensive when looking at the total cost of running that appliance during its lifespan.
    • cleon087
       
      It doesn't seem obvious but getting something cheaper will cost heavy in the long term.
  • investigate options to upgrade with the latest energy-efficient components to extend appliances’ working life and efficiency
  • Green labels
  • allows a single user to access several physical devices on one terminal. A computing device dedicated to an individual member of staff or allocated for one software application is highly inefficient and expensive. Virtualisation consolidates resources, requiring less power and cooling.
  • is to reuse, not recycle
  • and flat screens often being replaced well before the end of their shelf life and ending up in landfill, it’s imperative that the most is made of these materials by reusing them productively.
    • cleon087
       
      Normally people just upgrade because something new came out instead of using it until it stops working.
  • Dumping e-waste on developing countries was until recently commonplace, and it has caused huge environmental problems and harm to human health in countries such as Ghana and China. But new legislation, including the EU WEEE Directive and the 2010 US Responsible Electronics Recycling Act, has stopped countries from being able to export e-waste.
  • dopted a scheme where the cost of recycling an electronic item is included in the purchase price. In Switzerland, they’ve been able to return all electronic waste to their place of purchase since 2005, and in the European Union, Taiwan, South Korea and Japan manufacturers must by law recycle 75% of the e-waste they produce.
  • Smaller, more efficient processors.
  • which have greater memory storage capacity while requiring less energy and space. They are due to be on the shelf in about three years.
  • pecialist data centre design.
  • all sizes are starting to view IT outsourcing as a viable option to gain flexibility and reduce short-term costs and increase transparency of cost structures and processes.
  • 6. Water cooling
  •  
    Green IT is an aspect of technology that many people do even consider when thinking about sustainability. According to Computer Aid International, "The production of a computer requires 22kg of toxic chemicals, 240kg of fossil fuels and 1,500 kg of water. 80% of life-cycle energy use is accounted for before we even switch a PC on for the first time." This statistic alone should be enough for us to take action. Marriott has started taking action, however. They created an underground data center where the power consumption goes down and efficiency goes up. Cloud computing is also a massive help due to the fact that the physical software wont be on the desktop computers or laptops being operated so the power consumption will be lowered there as well.
  •  
    Green IT is an aspect of technology that many people do even consider when thinking about sustainability. According to Computer Aid International, "The production of a computer requires 22kg of toxic chemicals, 240kg of fossil fuels and 1,500 kg of water. 80% of life-cycle energy use is accounted for before we even switch a PC on for the first time." This statistic alone should be enough for us to take action. Marriott has started taking action, however. They created an underground data center where the power consumption goes down and efficiency goes up. Cloud computing is also a massive help due to the fact that the physical software wont be on the desktop computers or laptops being operated so the power consumption will be lowered there as well.
  •  
    This article focuses on the importance of having green IT in business. It shows example of other hotels that have already adopted green IT. Not only this but it offers tips for businesses that are looking to adopt green it. It highlights the issue of recycling computers instead of reusing it . They recommend to use the appliance until it doesn't work.
1More

Green Technologies In Computer Science | Greener Ideal - 1 views

  •  
    This article focuses overall on the explanation of what is green computer science and several different ways for you to practice that very same thing. Green computer science is definite as "the study or practice of eco-friendly computing or IT." This type of computing, while growing around the world and being a large part of the overall energy consumption, the problems with that grow as well. With the e-waste that comes with computing, green or otherwise, it is becoming more important than ever to try and find other ways of eco-friendly computing in order to combat the a,punt of e-waste that is produced as a result of the computing. The article highlights 3 different ways of eco-friendly to make sure you are doing your part and it also includes a symbol or brand to look for to make sure that the computer you do use or plan to use is eco-friendly as well. The secondary ways are as follows: 1. Dynamic power scaling which is a technique that allows a drastic reduction in the working rate or frequency of a microprocessor or link interfaces to reduce energy consumption and generation of heat by the chip. 2. Virtualization is a modern IT paradigm which allows separation of technology implementations and computing functions from physical hardware, while cloud computing is virtualization of computer programs via the internet. 3. Using terminal servers is a green computing technique that allows multiple users to connect to a central server, which performs all the processing; however, each user experiences the system on his or her terminal. Finally, the brand or symbol to look for on the computer to make sure that it is eco friendly and consume less power is the Energy Star located on products. In addition, it's not just for laptops; it's for computer monitors, printers, and desktops as well.
12More

5 Key Lessons Learned from Critical Infrastructure Cyber Attacks - 0 views

  • 5 Key Lessons Learned from Critical Infrastructure Cyber Attacks
  • Cyber criminals are highly motivated, creative, and nimble
  • Consider the rise of cryptojacking, which uses mining malware to hijack computers to mine cryptocurrency.
  • ...8 more annotations...
  • Don't be complacent — limit Internet access points with silos.
  • The attackers were just trying to look for unused processing power that they could use for their benefit."
  • finding the time to consistently audit and always be improving security is critical too
  • Keeping the critical infrastructure efficient and effective is challenging enough.
  • Train your humans.
  • This example underlines the importance of educating employees to always be vigilant and raising awareness of potential threats.
  • Stay current.
  • Concerns that new operating systems or software updates might destabilize crucial infrastructure can inhibit the best practice of always updating.
  •  
    There have been many cyber-attacks in many different nations and that is for many different reasons, such as outdated, human error, and all software being in one vulnerable spot. It is important to always update your programs, use cloud computing, and to educate your personal on all cyber-attacks. It is also important for your teams to understand the "why" behind updating and cloud computing and this is to always keep an upper edge on cyber-attacks. Cyber criminals are always changing their ideas and new ways to take over networks and workday and night to find someone to slip up and it can cause the complete down fall of a company or nation.
12More

Ransomware attack on chip supplier causes delays for semiconductor groups | Financial T... - 0 views

  • Disruption from a ransomware attack on a little-known supplier to the world’s largest semiconductor equipment manufacturers will continue into March, in a new setback to chip production after years of coronavirus-related delays.
  • first identified on February 3,
  • MKS’s customers include many of the largest companies that produce semiconductors and the specialised equipment necessary to manufacture them, including TSMC, Intel, Samsung and ASML.
  • ...8 more annotations...
  • The company had revealed on Monday that it could still take “weeks” more to restore operations and would cost hundreds of millions of dollars in lost or delayed sales. Most ransomware victims are able to recover in about three weeks, according to industry estimates.
  • The attack affected “production-related systems
  • , the company has now told the US stock market regulator that it is unable to file its annual report on time
  • the final impact on quarterly sales could total as much as $500mn — more than half what Wall Street had previously predicted
  • The semiconductor supply chain, which in many places relies on components made by only one provider, has faced repeated shortages over the past two to three years due to production and logistics delays.
  • However, demand for smartphones and other consumer electronics has waned in recent months as coronavirus lockdowns eased and consumer spending has been squeezed by inflation.
  • , it is unclear if MKS will be encouraged by US law enforcement to resolve the issue by paying a ransom.
  • Shares in MKS fell by about 15 per cent between February 3,
  •  
    The article "Ransomware attack on chip supplier causes delays for semiconductor groups," discusses the affects on a company due to a cyberattack that occurred February 3rd. The company is believed to have setbacks into March and that it would cost hundreds of millions of dollars in lost or delayed sales. The company also believes they will be unable to file its annual report on time and possibly have to resolve the issue by paying a ransom. This also cost a 15% decrease of shares for the Company.
6More

GDS Technology : Overview, Pros Cons and the Future Ahead - 0 views

  • If you want to gain better marketing exposure without shelling out for additional marketing costs, investing in a GDS is a wise decision. The system places your property in front of numerous clients without dipping into your marketing budget
  • - GDS also reap the benefit of reaching untapped segments for your property.
  • Another perk that comes with a GDS is the ability to update product information in real time.
  • ...2 more annotations...
  • As the industry becomes more collaborative and more inclusive, so does the technology. Some GDS firms are recognizing the need to include non-GDS, independent hotels in their searches in order to offer a better range of choices.
  • In addition to the positive economic outlook, the technology of GDS itself is proving to be a powerfully tool. With greater reach and increased visibility, GDSs make the jobs of agents easier, and in an information- based industry, ease of work is a high selling point. The GDS will have many more obstacles to face in its evolution, but the future looks bright for this inclusive booking software.
  •  
    The article discusses the pros and cons of the GDS. It also addresses the role it plays for helping smaller businesses in standing out to a large group of potential customers. Furthermore, the GDS has gone through many changes since the 1970's, but it is still thriving and overcoming new obstacles today.
50More

Digital Transformation in the Hospitality Industry | Boston Hospitality Review - 0 views

  • We are now experiencing the fourth industrial revolution, a period marked by emerging technologies such as artificial intelligence, robotics, virtual reality, the Internet of Things, and fifth-generation wireless technology.
  • The recent Covid-19 pandemic has accelerated this digital transformation resulting in a widening technology-mediated customer experience.
  • Service robots are “system-based autonomous and adaptable interfaces that interact, communicate, and deliver service to an organization’s customer” (Wirtz et al., 2018, p. 109).
  • ...46 more annotations...
  • The core interactive and communicative features differentiate service robots from other self-service machines, which result in unprecedented human-technology interactions in the hospitality industry.
  • he service production process, disinfection robots, which emit UV light to kill viruses and bacteria, were announced to be used in airports and hotels worldwide to ensure a safe and clean environment (Greg, 2020).
  • The robots drive around autonomously in high-touch public areas and select rooms at the hotel, removing all airborne viruses and bacteria. As an extension of the hotel’s “SmartStaySafety” operation, the use of UVD robots not only provides a safe environment but also assures guests that they are being protected. 
  • In
  • the service delivery process, service robots assist frontline staff in a sequence of service encounters. For instance, the robot concierges assist employees with guest greetings upon arrival, transporting luggage, guiding guests, and delivering room service.
  • service robots can effectively respond and interact with guests, even in multiple languages. 
  • While robots make significant contributions to operational efficiency, they also raise concerns.
  • Service robots are still novel in hospitality. Their ability to cope with unexpected, dynamic conditions remains to be fully explored.
  • If guests do not follow the pre-set route, service robots may fail to respond, which can lead to a service failure.
  • AI-powered online chatbots are also employed to provide swift answers to customers via live chats.
  • provide customers with immediate responses 24 hours a day, significantly improving customer engagement.
  • customers believed VR simulations would be the best tool for hospitality operators to create a compelling customer experience.
  • VR can make a huge difference in a customer’s booking stage.
  • Through the digitally accommodated environment, customers can have a much clearer sense of what they are expecting, thus attracting more prospective customers.
  • VR application is the virtual tour video,
  • This not only offers customers a chance to experience prior to booking, but also allows the hospitality business to benefit from the “try before you buy” marketing strategy. 
  • Unlike VR, which puts customers in a completely virtual environment, augmented reality (AR) is about enhancing the physical environment and the experience of exploring one’s surroundings in real-time.
  • The current applications of AR in hospitality are largely for entertainment and practical purposes.
  • One example is the Best Western Hotel Group’s experiment with AR and Disney stars.
  • Another application of AR is indoor navigation
  • Internet of Things (IoT) refers to “an ever-growing network of connected devices which communicate with a central server as well as with each other” (Car et al., 2019, p. 163).
  • IoT provides integrated services, such as automated door locks, light switches, electric blinds, and voice-assistant devices, which are connected on a network.
  • These allow customers to control or monitor their devices from a central server, such as a mobile phone or a tablet. 
  • For example, customers can use their mobile phones for self-check-in and check-out.
  • Rooms also become “smart” with the help of IoT, which is also called the “connected room” at Hilton hotels.
  • Customers can also use voice-controlled assistants, for example, the Amazon Alexa, to control those in-room features, and order food or drinks, which can be delivered by autonomous delivery robots.
  • In addition, devices, such as luggage carts with GPS function and sensors in the parking lot, can help customers to locate their luggage and cars. Thus, IoT helps improve service processes and makes customer experiences smoother.
  • It obtains real-time data through continuous tracking from various devices, as well as a collection of customer information that was previously unavailable, such as preferences, routines, and habits (Marek & Woźniczka, 2017).
  • there are several emerging issues that hospitality practitioners must take into consideration when embracing digital technologies, which include security, privacy, costs, and human touch in hospitality. 
  • IoT with locational information can send real-time personalized recommendations to customers based on their stored preferences.
  • IoT can collect customers’ preferences for in-room features, and the data can then be used to customize the room settings for their next stay.
  • Security is a fundamental issue in digital transformation in any industry, including hospitality.
  • Also, t
  • he broad connection of various devices brings vulnerability to digital networks.
  • Thus,
  • hospitality managers must prepare for security implications of digital transformation, which can be accomplished by adopting high-security technologies to reduce software vulnerabilities, building resources to mitigate risk of cyber-attacks, and training employees on cyber-attack prevention.
  • Privacy is another important factor as highly personalized services rely on storing and tracking customer preferences and behavior through digital technologies.
  • a transparent, strict, and clear privacy policy clarifying what data can be collected and shared, and who can own the data, is necessary.
  • Another challenge is associated with the high costs of employing these digital technologies.
  • For small businesses, using digital technologies in their daily operations may require significant upfront investments.
  • it is becoming critical for hospitality businesses to consider what digital technologies would most benefit their business.
  • for small hospitality businesses, they need to prioritize what works best for them when adopting digital technologies.
  • the paradox between digital convenience and in-person experience.
  • hospitality, particularly in fine dining restaurants, customer-staff interaction is highly valued by customers.
  • it is important for hospitality businesses to strike a balance between digital convenience and in-person experiences
  • Key considerations include judging what services cannot be replaced by digital tools, preservation of the choice for customers to decide between digital or human services to maximize customer experience, and incorporation of interactive digital features in the process.
  •  
    This article talks about the current applications of 3 innovative technologies and how they are used in the hospitality industry.
12More

Biometric Technologies as the Future of Hospitality - Intellectsoft Blog - 0 views

  • With the adoption of biometrics like fingerprints, face or iris scanning, or even voice recognition, biometrics have the potential to revolutionize the hospitality industry
  • Biometric technologies are solutions that are commonly used to identify a person based on some aspect, namely, a person’s unique physical or behavioral characteristics.
  • There are two types of biometrics used to recognize a person. The first type is biometrics based on physiological characteristics. The second is behavioral biometrics. Physiological identifiers include the following:
  • ...7 more annotations...
  • If your hotel has a lot of security measures, guests may not like it and they may never come back. If, on the contrary, security measures are weak, this can lead to theft or something else.
  • One of the ways to use biometrics in hotels and other establishments in this domain is to implement registration using fingerprint or face recognition
  • In the same way, hotel staff control guest access to different parts of the hotel, for example by requiring a finger scan to access the pool.Another way to use biometrics in hotels is to avoid key cards that allow guests to enter their rooms. Instead, a person just needs to scan their fingerprint, which greatly simplifies the system.
  • The first is that locals can register by scanning their faces through a mobile app. Another option is for foreigners who can check in by scanning their faces through vending machines located throughout the hotel lobby
  • as the fingerprint will become the only key to all areas of the hotel, which greatly facilitates the work of technical staff and saves the hotel from unnecessary problems with visitors.You can also monitor in real-time the access of staff to restricted areas of the hotel, such as guest rooms, washing rooms, etc. You can track which room a particular hotel employee has entered, thereby roughly understand their location.
  • According to one study, 41% of hotel visitors visited the hotel more often and stayed in only one hotel if an employee could recognize them without giving their name. In another survey, 62% of hotel guests believe that such actions by staff will greatly improve their experience of the hotel.
  • For example, a guest arriving at a hotel scans a fingerprint at the front desk, after which the concierge will immediately receive all of his personal information, room, and service preferences, to make his stay at the hotel as pleasant as possible.
  •  
    The use of biometrics in the hospitality industry is becoming more common. Through physiological characteristics such as fingerprints, face scanning or voice recognition, guests can access hotel rooms without the need of room keys. Employees would have control over guest access and be able to easily recognize guests after scanning in.
  •  
    This article discusses how biometrics is reshaping the hotel experience. From check in from the way we make purchases and enter different areas of the hotel. This feature is also able to enhance security and take away the old issue of lost keys. Many hotels are already implementing this feature and this is a great way to increase security measures.
10More

5 Ways Biometrics Could Change the Hospitality Industry | RoomKeyPMS - 0 views

  • Biometrics aren’t just used to enhance the guest experience. They can also help create in-house efficiencies as well, such as with a biometric-based system to track when employees
  • First, by making guest rooms accessible only by fingerprint or facial scanning, it eliminates the needs to manage key card inventory and the headache of lost, stolen, or deactivated cards.
  • Skipping all check-in formalities may not always been an option, but fingerprint or facial scanning can help to expedite the process.
  • ...4 more annotations...
  • Check-in via facial recognition is already active at hotels in China. FlyZoo, a 290-room hotel located in Hangzhou, allows guests to select their floor and room during booking on their mobile app.
  • The use of biometric data can help to ‘announce’ guests, their information, and their preferences without them having to provide any additional information.
  • Requiring the use of a fingerprint to authorize any additional payments during a hotel stay, such as food and beverage orders, spa treatments, or in-room entertainment purchases, makes check-out billing quick and accurate.
  • As the population becomes more comfortable with the use of biometrics in everyday life — such as using our fingerprints or faces to unlock our mobile devices — they will come to expect that same ease of identity verification for other purchases or experiences, like travel.
  •  
    Nothing ground breaking from what we have already heard. But the lack of response from the majority of the industry to implement is astonishing.
  •  
    Rapid Check-in, Easy & secure payments, Personalized Guest Experience, Quick Payment all sounds really good but there's other uses, tracking employees.
  •  
    This article talks about the biometrics in hotels. For example, In China, there is facial recognition to check into the hotel. Facial recognition can also be used as a "room key" as well.
9More

The Demand for Contactless Technology is Here - and Here To Stay | By Jasmine Seliga - 0 views

  • While hospitality technology is my passion, a pre-pandemic snapshot of our industry proves that adoption was on the slower side
  • Serving guests is the heart of our industry, and there are risks with automating processes that could potentially disrupt the seamless guest experience we have worked so hard to establish.
  • I am seeing an evolution of hospitality like I've never seen before, and it seems it is here to stay.
  • ...5 more annotations...
  • Our industry has been uncharacteristically receptive to new development and technology since the onset of the pandemic.
  • We are seeing the need for automated solutions to support staff in a way we never have before.
  • We must start looking to invest our dollars in a solution that handles everything from booking and contactless check-in, seamless guest communication all the way to business intelligence t ools that track the guest experience.
  • What should you be looking for if you haven't adopted an integrated solution already? Your system should give guests options to personalize and take control of their experience with online reservations, mobile check-in and check-out, self-service kiosks, communication through a guest portal, and support for online and mobile payments. The more convenient self-service options you can provide, the greater your guest satisfaction will be.
  • Be open to the agility of a product that can do more than take a reservation and check a guest in. And most of all, stay engaged. Stay engaged in what's going on in and around our industry.
  •  
    The Hospitality industry has been somewhat hesitant to adapt to new technologies. This may be the case of hospitality companies being scared to go away from what we consider good customer service. The pandemic helped to jumpstart the hospitality industry into accepting new forms of technology. Technology is on the rise in the hospitality industry and is only going to continue to be more and more prevalent.
1More

The Evolution of POS is Changing How Restaurants Operate - 0 views

  •  
    Martin Goodwin and Bob Henry created the first POS software in 1992. The POS system has evolved into a powerful and user-friendly tool almost every business had adopted. Mobile POS has been a new attraction and can be the future for hospitality businesses.
12More

Why hotels need strong security for contactless check-in | Hotel Management - 2 views

  • Contactless check-ins have become an important option, allowing guests to bypass the usual check-in at the front desk and access their reserved room using their mobile device.
    • jsanc478
       
      This article talk about how the pandemic change the way hotels will operated now on for a better customer service with their guest as check ins and other updates. One ofd the principle changes will be, mobilize check in. Having the guest check in with the phone and how safe that can be for the guest. There is always fraud around that hack information on business likes this, but how hotels can protect this type of fraud, by linking digital room keys to theirs guest's mobile devices.
  • Some hotels are also allowing their guests to use their mobile devices as digital keys
  • Concerns about this type of fraud are legitimate. Yet, if hotel operators adopt a multilayered approach, it will be more difficult for fraudsters to ply their trade.
  • ...7 more annotations...
  • However, it is also an appealing avenue of potential fraud for hackers because mobile devices are one of the most common targets for identity theft
  • Limiting contactless check-in options only to certain guests,
  • Linking digital room keys to their guests’ mobile devices themselves, rather than to their guests’ phone numbers, ensures the hotel operators are communicating directly
  • Having a multifactor authentication process established for new guests or those guests who are showing a different behavior pattern than in the past
  • Implementing a notification system i
  • Developing rules around certain reservation dollar amounts
  • Every hotel operator will have to design these options based upon the needs of their hotels.
  •  
    More hotels are now using contactless check-ins by allowing the guest to be able to use their mobile devices as their digital room key. This is great for the pandemic to social distance but potentially risky due to hackers. As long as hotel operators adopt multilayer security strategies then they can provide a safe and secure environment for everyone.
1More

Security Control Redundancy Allocation Technology and Security Keys Based on Internet o... - 0 views

  •  
    One of the main topics addressed during the week was related to internet redundancy and its importance not only in the business spectrum but also in the daily routine of individuals. This discussion revolves around security and the recklessness of cyber threats to confidential information stored on systems. This article offers a more technical view, somewhat far-fetched, but the relevant factor that encompasses everyone's primary concern with security deserves to be highlighted. The sophistication developed in the methodological design of algorithms to control the entire network provides a sense of relief, as the refined development demonstrates an evolution that reduces the issue of cybernetic vulnerability that so worries those who adhere to the technological advances of the internet network. Therefore, even for those not specialists in the area, the article presents relevant information regarding the uncertainty related to the security factor that afflicts network users around the globe.
« First ‹ Previous 2861 - 2880 of 2883 Next ›
Showing 20 items per page