Skip to main content

Home/ Hospitality Technology/ Group items tagged traffic

Rss Feed Group items tagged

naram003

View of Role of Information Technology in Promoting Tourism: Study In Indian Context - 0 views

  •  
    This article goes into detail on how information technology has grown to a critical level for the success of business operations. Tourism has grown in India to become the largest service industry for the country, providing 6.23% to the national GDP, and providing 8.78% of the total employment. It is estimate that over 5 million annual foreign tourists arrive alongside 562 million domestic tourists. The implementation of this information technology provides a multitude of benefits including reducing costs, enhancing operation efficiency, and improving service quality and customer experience. To list some of these components; The railway, car rental, and bus/coach systems are all computerized and information regarding tourist/passenger transit data is now readily available. Airlines have fully implemented CRS (Computer Reservation System) to help generate higher rates of occupancy and boarding the scope of the market. Though these systems have helped improve the India's economic growth, the current structure of the tourism industry has shown that businesses in the accommodation sector lacked direct access to travelers and consumers. It's thanks to e-business that suppliers have found technological solutions (GDS's) to direct traffic properly. The Ministry of Tourism's Plan channels over half of their budget to the development of destinations, circuits, mega projects as well as rural tourism infrastructure projects. The travel and tourism industry has revolutionized the travel plans and strategies for India, and it's thanks to the embracing of newly developed and effective information technology that has turned operations to running on a new level of efficiency.
sherylvelazquez

The Future of Global Distribution Channels: New Horizons for Airline e-Commerce - 0 views

  • Earlier this year, Lufthansa announced that it was adding a surcharge to all bookings made via global distribution systems in an attempt to funnel traffic to direct bookings
  • Nonetheless, distribution has seen a number of interesting trends that may spell new opportunities for airlines looking to capture new markets, bring in additional revenue via ancillaries, and keep pace with the competition. Airlines are more interested than ever in alternative distribution, with the majority of airline marketing/sales/distribution executives saying they are very or extremely likely to adopt an alternative to GDS by 2017.
  • Overall, travel “distribution” is becoming more like “e-commerce,” with campaigns, offers, and channel marketing edging out the simpler “product push” of yesteryear.
  • ...3 more annotations...
  • Pay-per-click advertising is a huge boon for the travel industry – travel and tourism was the third highest spending industry on Google AdWords in 2014,
  • Metasearch is a great opportunity for airlines because, again, it meets comprehensive or complex travel shopping needs.
  • With IT solutions that can gather, store, and analyze data in a variety of ways, airlines are better able to monitor performance across channels, quickly adjust offers based on a variety of situations and circumstances, and optimize communications and transactions by device.
  •  
    This article is about the future of global distribution systems and how airlines are making a push towards direct bookings. They are using things like performance adverting, metasearch networks, and data based e-commerce in increase revenue and improve operations.
kaseyfl9568

Using your POS system to boost productivity - 0 views

  • This article will cover a couple of ways your POS system can help boost productivity in your establishment and ultimately increase profits because, isn’t that always the goal
  • When experiencing peak traffic times in your restaurant, it is important to have the correct number of employees staffed
  • On the other hand, staff too many employees and you either end up paying people to stand around or with frustrated employees because of a decreased tip share
  • ...4 more annotations...
  • Your POS system is a great tool for enabling confidence in choosing the exact number of employees needed for each shift. The sales data collected by your point of sale system is a great resource to discover trends for the peak times in your restaurant.
  • Employing a POS system to handle the management of inventory will help to eliminate waste, avoid shortages, and save time
  • The system will also keep real-time counts on new ingredients and supplies as they arrive at the restaurant and are used in each customer’s order.
  • restaurants to focus on productivity without having to spend too much time on the matter.
  •  
    Restaurants are one of the most tedious and stressful businesses. Being diligent and focusing on attention to detail is very important. But with this comes being time oriented and managing every task at the upmost level. Sometimes, being a manager in the restaurant industry, you are pulled in many directions that human error is entered into many ways for money to be lost. Using POS systems assists in keeping track of any items not just ticketing systems from front of the house to the kitchen. Inventory can be kept track of with POS systems, to labor forecasting, to purchasing, etc. These functions assist taking a big part of human error out of the aspect to allow for more accurate documentation of revenue. This is also now freeing up time so the manager can focus on other items to assist in driving revenue.
dlcrawford

The Impact of Technology on Hotel Sales and Marketing | By Court Williams & Rachel H Le... - 0 views

  • Sales and marketing is also exceptionally challenging because of the potential dilution of established brands, the complexity of building overall brand loyalty, and the risk of management forfeiting their focus on less "cool" brands in the stable in favor of the latest shiny thing.
  • In their efforts to achieve visibility, hotels compete to incorporate inviting, "Instagrammable" backdrops into their design. Research from Travolution shows 40% of millennial travelers chose a destination based on how Instagrammable it was, bypassing the cost and availability of alcohol (24%) and the opportunities to explore local cuisine (9.4%).
  • Good reviews strengthen the brand's reputation, regular postings (either by marketers or guests) generate SEO content, and instant chat mechanisms support the decision-making and booking processes.
  • ...8 more annotations...
  • If the industry can't keep up with the opportunities presented by technology, it risks (like Survivor) being outplayed and outlasted.
  • the ability to gather first-party data from those systems, map it against second and third-party business intelligence, and generate results that can bring every property exponentially closer to fulfilling the needs of its target audience
  • Content management systems provide them with the ability to hyper-personalize their marketing communications
  • many vacancies now carry new qualification requirements for candidates to be knowledgeable in social media and content marketing.
  • Near-field communication(NFC) technology works with smart devices to provide customized, location-based suggestions for activities and excursions
  • Voice-activated assistants do more than turn on lights, TV and air-conditioning. They wear a marketing hat, too, by enabling the easy use of peripheral services such as in-room dining, restaurant reservations, and bookings for spa sessions
  • The ability to track guests and their preferences translates into predictive analytics, which make it possible to be proactive rather than reactive
  • video ads are significantly more popular than their text counterparts, with 80% of all web traffic expected to be directed to video content by the end of 2019.
  •  
    This is an awesome article describing the growth of technology in marketing strategies. It lists some of the many ways that eMarketing is evolving, and how these changes are affecting the hospitality industry.
  •  
    Wow that was a good article! Thank you for sharing!
mayr0604

Data Mining: What is Data Mining? - 3 views

  • For example, one Midwest grocery chain used the data mining capacity of Oracle software to analyze local buying patterns. They discovered that when men bought diapers on Thursdays and Saturdays, they also tended to buy beer. Further analysis showed that these shoppers typically did their weekly grocery shopping on Saturdays. On Thursdays, however, they only bought a few items. The retailer concluded that they purchased the beer to have it available for the upcoming weekend. The grocery chain could use this newly discovered information in various ways to increase revenue. For example, they could move the beer display closer to the diaper display. And, they could make sure beer and diapers were sold at full price on Thursdays.
  • Data warehousing is defined as a process of centralized data management and retrieval. Data warehousing, like data mining, is a relatively new term although the concept itself has been around for years.
  • ata mining is primarily used today by companies with a strong consumer focus - retail, financial, communication, and marketing organizations. It enables these companies to determine relationships among "internal" factors such as price, product positioning, or staff skills, and "external" factors such as economic indicators, competition, and customer demographics. And, it enables them to determine the impact on sales, customer satisfaction, and corporate profits. Finally, it enables them to "drill down" into summary information to view detail transactional data.
  • ...3 more annotations...
  • WalMart is pioneering massive data mining to transform its supplier relationships. WalMart captures point-of-sale transactions from over 2,900 stores in 6 countries and continuously transmits this data to its massive 7.5 terabyte Teradata data warehouse. WalMart allows more than 3,500 suppliers, to access data on their products and perform data analyses. These suppliers use this data to identify customer buying patterns at the store display level. They use this information to manage local store inventory and identify new merchandising opportunities. In 1995, WalMart computers processed over 1 million complex data queries. The National Basketball Association (NBA) is exploring a data mining application that can be used in conjunction with image recordings of basketball games. The Advanced Scout software analyzes the movements of players to help coaches orchestrate plays and strategies. For example, an analysis of the play-by-play sheet of the game played between the New York Knicks and the Cleveland Cavaliers on January 6, 1995 reveals that when Mark Price played the Guard position, John Williams attempted four jump shots and made each one! Advanced Scout not only finds this pattern, but explains that it is interesting because it differs considerably from the average shooting percentage of 49.30% for the Cavaliers during that game.
  • How does data mining work? While large-scale information technology has been evolving separate transaction and analytical systems, data mining provides the link between the two. Data mining software analyzes relationships and patterns in stored transaction data based on open-ended user queries. Several types of analytical software are available: statistical, machine learning, and neural networks. Generally, any of four types of relationships are sought: Classes: Stored data is used to locate data in predetermined groups. For example, a restaurant chain could mine customer purchase data to determine when customers visit and what they typically order. This information could be used to increase traffic by having daily specials. Clusters: Data items are grouped according to logical relationships or consumer preferences. For example, data can be mined to identify market segments or consumer affinities. Associations: Data can be mined to identify associations. The beer-diaper example is an example of associative mining. Sequential patterns: Data is mined to anticipate behavior patterns and trends. For example, an outdoor equipment retailer could predict the likelihood of a backpack being purchased based on a consumer's purchase of sleeping bags and hiking shoes.
  • Size of the database: the more data being processed and maintained, the more powerful the system required. Query complexity: the more complex the queries and the greater the number of queries being processed, the more powerful the system required.
  •  
    This article highlights the topic of Data Mining and the way in which companies use it to become informed and discover new ways to become more effective. Data Mining can be used to increase revenue, cut costs and identify growing trends. This article will feature key examples from major companies such as Oracle, Wal-Mart and the NBA, all of which use Data Mining to enhance their business performance. 
kdibe001

Predicting the Future of Computer Networks and the Internet - 0 views

  • Broadband routers and other home gateways become obsolete: As people end up owning hundreds of wearable and mobile devices that need to communicate both inside in the home and away, installing fixed routers inside a home to manage traffic will no longer make sense: Devices will all communicate with each other and the Internet directly.
  •  
    This article predicts the future of networking and the internet, which is a challenging thing to do, considering how complex this technology is. Among some things predicted are that web site address space will eventually run out and the domain names will crash as human recognition will be able to navigate through web pages. The most interesting thing I found is that broadband routers will soon disappear due to multiple internet capable devices will be able to solely communicate with each other, meaning our phones, watches, and computers will all be connected without a router. It also goes deeper into the possibility of a future without an internet network. It's hard to predict that we will also be able to fight against cyber attacks and spam and keep our internet at use. Imagine a future with no internet! What will be the next big thing then?
rderonville

Cybersecurity Tactics for a Hotel Industry that's Under Siege | News | Hospitality Maga... - 1 views

  • Credit card fraud and identity theft should remain high on the hotel and lodging industry’s radar.
  • Reputational damage and revenue loss from a breach headline not only impact individual edge locations, but the corporate brand as well.
  • POS systems are a weak security point for many networks because they are constantly in use — and aren’t always patched, updated or protected from vulnerabilities as frequently as required. As a result, they can be exploited for the credit card data held on the POS terminals.
  • ...4 more annotations...
  • n addition to airlines and banks, hotels maintain a rich database of personally identifiable and financial data on file.
  • Hotels need a ‘toolbelt’ of various security technologies that can be used to prevent malicious attacks. A managed firewall is essential, blocking dangerous traffic from coming onto the network and preventing sensitive data from being exfiltrated, or sent, to the hackers.
  • One way to implement these advanced toolsets includes outsourcing to a managed security firm specializing in this type of service
  • If used correctly, hotels could see anomalies that could lead to breaches prior to any damage being done — allowing them to halt hackers in their tracks.
  •  
    Hotels POS systems are at risk for customers. Hackers are using tactics like Phishing and ransomware. Hotels must take action and arm themselves with a "toolbelt" of security options to combat the hackers.
  •  
    This article explores the issues with cyber security in the hotel industry. it is to be taken seriously because customer information is on the line and so is the company's reputation and revenue. Hotels must look into their POS systems because, according to the article, is a weak security point. However, it holds much of the consumer's information like credit card numbers, expiration dates, and etc. The POS system is vulnerable so the secuiry put in place to protect it must be updated. Personal details for hotel guests are stored in many different places in a hotel's many systems. This includes the restaurant, gift shops, billing, facilities, and etc. According to the article, hotels needs a "toolbelt" of various security technologies to prevent malicious attacks. The three mentioned in the article are File Integrity Monitoring, Unified Threat Management, and Security Information and Event Management. Please look into the article to read what each of these systems can do in regards to cyber secuity for the hospitality industry. A good way to implement these tools is to look into outsourcing a managing security firm that specializes in cyber security. This can help minimize and even diminish things that can cause breaches in systems. In my opinion, this article gives solutions to hotels in regards to cyber security. Sometimes installing a firewall or antivirus is simply not enough. A security firm that specializes in this area can be considered. It may be expensive depending on the business to do that, however, it will be even more expensive to have a tarnished reputation for not securing customer information and to deal with lawusuits.
Maria Zuniga

Event Planning In The Hotel Of The Future - 1 views

  • Combining today’s recognizable technology, such as touchscreen and virtual reality, with concepts that are beyond our time, these are some of the notable features hotels in the future will have.
  • he idea of using robots could help break down the language barrier that is sometimes the case when planning in other countries as these robots are naturally multi-lingual and can adapt to the language you are using.
  • This includes robot butlers, entertainment, greeters and business services which for planning events can be more cost effective and reduce human error, streamlining the process of communicating with the systems to get exactly what you want.
  • ...12 more annotations...
  • As one of the strongest drivers for change in the event industry, technology plays a prominent role in the planning and management of events
  • It could also be the case that it loses that human touch for the guests and when quick problem-solving is needed, robots won’t be able to deal with this as intuitively as they follow set protocols.
  • With 3D bio-printing currently being researched, it is not a huge leap to consider 3D printers in hotel rooms that can accommodate products such as headphones or clothing and accessories
  • Based on votes and crowdsourcing, venues can be made-to-order and self-assemble the environment around them to suit.
  • Larger venues and associated grounds could create an event in themselves by recreating famous landmarks or even movie settings that could be explored.
  • Based on your DNA, own health and genetics you would be able to visit health centers and spas that could promote longevity. It could become the latest trend in bachelorette parties or healthy event experiences that cater to the health conscious.
  • A hotel that is short-term and could pop-up in limited spaces would work hand in hand with pop-up events and mean they could be reproduced on a larger scale.
  • It is suggested that fast and effective hovering, autonomous airport transfers would be able to go supersonic in order to beat the traffic and reduce the journey. If this is the case it could free up plenty of time on the itinerary for corporate or destination events and this means providing a better experience.
  • As sustainability and environmental issues are becoming an increasing concern and given prominence, it makes sense that future hotels and venues would plan sustainable events and accommodation
  • Sustainable hotels that produce and operate on clean, self-sustaining energy will become a viable option for the environmentally conscious guest and the suggestion is that all hotels would have the option to become sustainable.
  • These would work in a similar way to how a concierge app works now and would streamline the travel bookings and searches. In the same way that Siri can help you access items from the internet or your phone, these avatars would be a more complex and capable version that cuts out the need for travel agents
  • rom biometric payment systems which can greatly reduce the risk of identity theft to eye scanner room entry, DNA authorizations will be more popular. As technology develops, so does the need for security
  •  
    This article talks about the future of event planning. The efforts hotels will have to make to be competitive in the industry. It also talks about the technology that will have to be offered such as VR (virtual reality).
  •  
    This article is very interesting because it lists all the ways that event planning will be in the future because of technological advances. It talks about autonomous staff, 3D shopping, made-to-order venues, personalized longevity health spas, pop-up hotels, supersonic air travel, sustainable hotels, personal travel avatars, and DNA authorization. The article describes the benefits and downfalls to each one and puts emphasis on the fact that these advances are closer than we can imagine.
Maria Zuniga

5 Profitable Internet Marketing Strategies for Hotels - 0 views

  • If you're a hotel owner, chances are you are always looking to attract new guests to your location
  • Hospitality marketing is not always easy
  • Optimize your website for search engines
  • ...15 more annotations...
  • One of the most crucial strategies for hospitality marketing involves ensuring the visibility of your hotel's website on search engines
  • Having this information available up front can provide enormous benefits for your hotel. If you neglect this strategy in your hotel Internet marketing plan, you will be sacrificing many potential guests. One study found that 40% of mobile searchers are looking for travel-related information, like hotels, are likely to place phone calls if the option is available. Setting up your Google My Business page can make that option available instantly!
  • Research has shown that the top result in searches gets around 33% of clicks. This drops to 17% for the second result and 11% for the third. If you're on the second page, you're looking at about 1% or less.
  • Strengthen your local SEO
  • earch engine optimization involves making critical updates to your website's content, code, links, and occasionally layout to improve its likelihood of ranking in user searches.
  • Because hotels may have a hard time gaining a large number of engaged fans to consume their content or make future bookings, a shift in approach is recommended. For hotels, social media can be an incredible way to encourage interaction with past, current, or future guests, solve customer service issues in a timely manner or highlight the positive experiences that guests have had at your hotel
  • Encourage interaction on social media
  • Linking to your social media pages from your hotel website, and ensuring that they are checked regularly, can help encourage potential guests to contact you there. You may also want to add a tagline to your website, such as, "contact us on Facebook or Twitter with any questions we may answer about your stay"—to encourage this behavior.
  • Social media also helps humanize your business so that you can more easily relate to customers, making it a valuable part of an overall hotel internet marketing strategy.
  • Educate guests with content marketing
  • you may know that adding informative, keyword-rich content to your website is one of the best ways to improve your ranking on search engines
  • Dominate your competitors with PPC
  • nternet marketing for hotels can be highly challenging if you operate in a city that is a popular vacation spot or tourist attraction.
  • Pay-per-click advertising, or PPC, is another way that you can boost your hotel's visibility in search results. Searches on Google don't deliver just natural (also called "organic") results—they also deliver paid ads that have been placed there by companies or businesses.
  • PPC advertising works like this: your hotel sets up ads around certain relevant keywords, like "hotel in [city][state]." You then bid a certain amount, usually suggested by Google, to have your ads appear at the top and along the sides of organic search results. You don't pay anything for your ads unless they are clicked—thus the name "pay-per-click."
  •  
    This article was very interesting because it provided us with 5 different strategies to effectively use e-marketing for hotels. The five strategies they come up with are: Optimize your website for search engines, Strengthen your local SEO, Encourage interaction on social media, Educate guests with content marketing, and Dominate your competitors with PPC. All of these are very helpful hints that we might have heard of before, but it is crucial to go more in depth. I found very interesting that all of them are free except for the last one that requires a bit of an investment.
yimengliu

Hotel Wi-Fi: The Biggest Challenges and Recommended Solutions, by Jeremy Rock - 1 views

  • Wireless has also created new ways for hotels to connect with their guests to generate loyalty
  • What is an illegal download? It is receipt (download) of copyright content without paying the prescribed fee, or receiving any other media that is deemed unlawful. It can occur in a variety of ways, exchange of flash drives, peer-to-peer (P2P) networking, or World Wide Web-based media.
  • Security and the potential compromising of personnel guest data is becoming a key concern amongst season travelers. Hotel networks tend to provide the illusion that guests are accessing the internet through a fairly secure environment. However in many cases hotels are acting simply as a HOTSPOT and are no more secure than the shared connection at your local coffee shop. Often hotels act simply as an ISP and offer no more security when controlling and monitoring the traffic on the network. The following are some items to consider when addressing Wi-Fi security concerns:
  •  
    This article is talking about wireless internet becomes more and more important in the hotel industry. They provide some of the key considerations for the hoteliers that help the hotel to ensure they can meet the demands of their customers. There's a big demand for wireless access to hotels. Every customer would like to choose a hotel with a Wi-Fi service. Wireless become very necessary in the hospitality industry. The best wireless service that can help the hotel create the loyalty customers. Wi-Fi has become a standard amenity, therefore, the hotel has to find affordable and non-disruptive solutions to meet customers wants and needs. Currently, customers would like to use the smart phone and their computer to watch videos rather than watch TV. They are not just sending email and web surfing anymore. There have a strong needs of the best internet from the hotels. The articles showed us couple challenge of wireless in the hotel. First of all, weak cellular signal strength. In many hotels, for guests, it's not always can find the signal of their cell phone, especially in urban area. The customers can't have a good voice communication with others. Maybe because the location of that room in the corner and there have something will disturb the signals or building construction that will interrupt the signal as well. The solution of the cellular signal strength is "Make provision for both voice and data signals to be amplified." To installing that equipment that always needs the hotel to run a new cable in order to provide the good signals for the guest used. The second challenge for the hotels is "Cellular Network Capacity Issue". Since cellular companies continue selling the device for many years without expanding their network to meet their demand. For example, AT&T is the first company that realized this issues when there are sell iPhone and another cellular. Thus, it's very important that each device support connection to the internet by use Wi-Fi withou
jalilahst

What is Network Redundancy and Why Does It Matter? - 0 views

  • Network redundancy is the process of adding additional instances of network devices and lines of communication to help ensure network availability and decrease the risk of failure along the critical data path.
    • jalilahst
       
      Defines Network Redundancy.
  • Redundancy in networks helps to eliminate single points of failure to ensure better network stability and uptime in the face of events that would otherwise take th
  • e network offline
  • ...11 more annotations...
  • A fault-tolerant redundant system provides full hardware redundancy, mirroring applications across two or more identical systems that run in tandem
    • jalilahst
       
      1 form of redundancy that data centers use.
  • fault-tolerance redundant systems are complex and often expensive to implement.
    • jalilahst
       
      Disadvantage to fault tolerant redundant systems.
  • If something goes wrong with one server, the backup servers take over and restart applications that were running on the failed server.
    • jalilahst
       
      How high availability works, the 2nd form of redundancy that data centers use.
  • it does tolerate a certain amount of downtime in that there is a brief loss of service while the backup servers boot up applications.
    • jalilahst
       
      Disadvantage to high availability software based redundant system.
  • create a network strategy that reviews existing infrastructure.
    • jalilahst
       
      First steps of network redundancy plan.
  •  Well-maintained UPS systems can ensure that servers can switch over from electrical power to backup generator power without losing any data or applications.
  • the best places to replicate and store data so it can be easily accessed in the event that other redundant systems fail and the main network goes down. By using more than one data center, companies can ensure that even if some disaster occurs, they will be able to carry on with minimal disruption.
    • jalilahst
       
      The importance of backing up data offsite.
  • They can test different connections by physically disconnecting hardware to make sure failover occurs as anticipated. If things do not go as planned during testing, data center managers then create an after-action report that lists the items they need to fix as a result of the testing.
  • creating incident response plans that can counter them is crucial for ensuring network resiliency in the face of modern cyber threats. Network redundancy can be a crucial aspect of many cyber incident response plans.
  • attacks are a type of cyberattack where the goal of the attacker is to render a target network or service unusable
    • jalilahst
       
      DDoS definition
  • By blending a variety of ISPs, data centers can leverage their connectivity to help reroute network services when a DDoS attack is underway. vXchnge’s vX\defend, for instance, uses diverse traffic routing options to identify and bypass volumetric attacks without compromising bandwidth or increasing network latency.
    • jalilahst
       
      prevent DDoS attacks by implementing redundant networks with flexible internet access.
  •  
    Network redundancy is the process of enhancing network devices and lines of communication to help safeguard network availability and decrease the risk of failure along the critical data path. Redundancy in networks purpose is to help eliminate specific areas of failure to guarantee better network stability and availability when the network would otherwise be offline. Optimize network redundancy by backing up data offsite and conductions frequent test to measure its durability and maintain it. Protect the network from malicious attacks is also important. By creating plans for when attacks occur by rerouting network services.
anonymous

See How This Startup Created a Contactless Activation | BizBash - 1 views

  • over 1,500 New Yorkers took to the streets for a “gift hunt” hosted by mobile shopping assistant nate.
  • The one-day event featured activities, photo ops and treasures disguised as QR codes, ranging in value from $25 to $250 from brands such as Public, ManiMe, 305 Fitness and Frank Body. The participant who collected the most points won a grand prize of $10,000.
  • the activation also aimed to support small businesses by attracting foot traffic to their physical locations, some of which were hit hard by the pandemic.
  •  
    This gift hunt utilized a mobile shopping assistant app, Nate, to engage customers with various brands. Using location based marketing through QR codes, players found brands and then received information or promotions about the brand.
dbake008

The Different Types of Cloud Computing and How They Differ - 0 views

  • clouds, in the tech sense, are incredibly versatile
  • Cloud computing still relies upon the same physical server hardware that forms the backbone of any computer network. The difference is that cloud architecture makes the processing power and storage capacity of that hardware available over the internet.
  • Cloud deployment describes the way a cloud platform is implemented
  • ...25 more annotations...
  • , how it’s hosted, and who has access to it.
  • A completely on-premises cloud may be the preferred solution for businesses with very tight regulatory requirements,
  • The great advantage of a public cloud is its versatility and “pay as you go” structure that allows customers to provision more capacity on demand.
  • On the downside, the essential infrastructure and operating system of the public cloud remain under full control of the cloud provider
  • Public clouds typically have massive amounts of available space, which translates into easy scalability
  • A cloudbursting model uses the public cloud’s computing resources to supplement the private cloud, allowing the company to handle increased traffic without having to purchase new servers or other infrastructure.
  • less economical model than the public cloud
  • private clouds lack the versatility of public clouds
  • Simply put, hybrid clouds combine public clouds with private clouds
  • The primary advantage of a hybrid cloud model is its ability to provide the scalable computing power of a public cloud with the security and control of a private cloud
  • A misconception about both colocation and the cloud is that they’re an “either-or” investment. As mentioned, the two can be deployed together as part of a hybrid cloud model, enabling more streamlined application management
  • it can be cost effective, though the initial expenditure for the private cloud should be considered
  • work with a service provider who has significant experience in the the hybrid cloud model as there are potential performance and security risk inherent to the need for the two different servers (public and private) to communicate and share data.
  • Although not as commonly used as the other three models, community clouds are a collaborative, multi-tenant platform used by several distinct organizations to share the same applications.
  • scalability is a benefit
  • system remains highly flexible,
  • The shared storage and bandwidth can create issues with prioritization and performance as servers adjust to demands
  • In some cases, a single public cloud isn’t enough to meet an organization’s computing needs. They turn instead to multi-clouds, a more complex hybrid cloud example that combines a private cloud with multiple public cloud services
  • IaaS is the most comprehensive and flexible type of cloud service available. Essentially, it provides a completely virtualized computing infrastructure that is provisioned and managed over the internet.
  • Situated a bit higher up the cloud computing pyramid is PaaS
  • PaaS provides the framework needed to build, test, deploy, manage, and update software products
  • SaaS is a fully-developed software solution ready for purchase and use over the internet on a subscription basis
  • If controlling the environment is essential, as are tight security regulations because of your industry, private cloud solutions offer both security and control.
  • when looking for a cloud services provider, you want to choose a company that not only knows, but understands your business or industry
  • The bottom line is this: if you are in the market for a colocation partner, you want to make your research process as exhaustive as possible. Consider all possible scenarios, all possible needs, and how your provider can meet or exceed your service expectations while partnering with you for succes
  •  
    This article gives examples of the various types of cloud computing and their advantages and disadvantages. It shows that there are cloud-based options that can be appropriate for every business.
fdiaz75

CES panel to explore power of artificial intelligence | - 0 views

  • Guests will notice how AI technology can enhance their hotel stays and experiences on the casino floor.
  • Guests can text Ivy, powered by Go Moment, for food or entertainment recommendations, dinner reservations, housekeeping requests, or ask common questions like Wi-Fi passwords and pool hours.
  • companies like Konami and Scientific Games have developed AI technology for slot machines. It incorporates facial recognition capabilities to identify who is playing their games, and tai
  • ...2 more annotations...
  • lor more personal services based on a user’s visitation, spending and dining habits
  • Crowd-tracking technology can also help a casino optimize its floor layout based on traffic flows and which products are used more than others
  •  
    The article focuses on how artificial intelligence will shape the casino and hotel industry in Las Vegas and beyond. AI currently used at all but one Caesars Entertainment Inc. properties in Las Vegas is called IVY. This virtual concierge is able to answer a multitude of questions that front desk would be called for which reduces call volume and lines at the front desk. On the casino floor Konami and Scientific games have AI technology with facial recognition for slot machines that provide personalized service, user login, and gambling recommendations. The article also discusses how crowd tracking technology and in security helps with the floor layout and what guests are on the floor. As stated many of the security features may be in place now.
anonymous

Why Proximity Marketing Failed and How it Can Succeed in 2019 - 0 views

  • According to Boston Retail Partners, just 13% of retailers can identify customers as they enter a store, with another 10% identifying customers at checkout. In comparison, 60% of retailers identify customers during online shopping.
  • One of the biggest reasons for this is that beacon technologies have required customers to have bluetooth turned on. Beacon programs also often require customers to have download the right app and have that app turned on
  • A survey conducted by Borrell and Associates discovered that just 25% of retailers think beacons have a greater-than-50 percent chance of driving sales in stores.
  • ...7 more annotations...
  • The truth is that beacon programs routinely fail to offer customers requisite value.
  • According to research, consumers change phones often, every 2-3 years. When customers change phones they also change their MAC addresses. When this happens, retailers instantly lose insight into that individual’s historical behavior.
  • According to econsultancy, only 4 percent of consumers have ever downloaded a luxury retail shopping app. And even consumers who do download retail apps only spend 5% of their time using shopping apps. In truth, a proximity marketing strategy based heavily on an app can present some serious friction. As a result, 44% of retailers have removed their apps from the app store since 2015 and 56% fail to regularly update that app.
  • Though there have been historic limitations, proximity marketing is not going away it’s merely evolving
  • [retailers] will embrace neural networks and machine learning devices to get more connected. Analysts will use customer … traffic and behavior data to create experiential shopping destinations.”
  • Using AI-powered face recognition enables retailers to instantly recognize when individuals enter a store. While consumers change their phones regularly, they don’t change their faces
  • Facial recognition can also remove friction across the buying journey by offering the ability to seamlessly pay by face, verify age, or participate in loyalty program
  •  
    Consumers change phones often which in turn changes their MAC addresses. Retailers then lose all the the consumers behavior. Most consumers also rarely download retail applications.Although proximity marketing has had its limitations, it has continued to evolve which means that it will be present in the future.
jorgeegutivav

Meeting the Threat in 2019: Cybersecurity for the Hospitality Sector | Modern Restauran... - 0 views

  • With a reputation as less well guarded than similar institutions, hospitality companies are a popular target for cyberattacks.
  • Experts warn other hackers, like those working for a nation-state, could exploit hospitality breaches like Marriott’s to acquire details on the travel and spending habits of espionage targets, like CEOs and diplomats.
  • permeable security in the hospitality sector threatens consumer privacy, shareholder value, and national security.
  • ...15 more annotations...
  • many hospitality companies are reconsidering their cybersecurity infrastructure. However, industry specific challenges like high employee turnover continue to expose the sector.[6]Additionally, even by adopting cutting-edge cybersecurity technologies, the important question of strategic implementation remains.
  • Are newly introduced technologies simply bolstering traditional methods of cybersecurity, or are they being used for methods of cybersecurity that are new and innovative, instead of simply faster or more efficient versions of the same product?
  • Traditional cybersecurity approaches are focused on reporting about intrusions after the fact, in what is known as an “incident response.”
  • Regardless of how they gain access, once an attacker is discovered, the forensics about the attack, including basic information known as Indicators of Compromise (IOCs) like IP addresses, domain names, or malware hashes, are shared across the cybersecurity community. These IOCs are then used broadly to thwart future attacks. 
  • The problems with this approach are twofold:
  • someone has to be a victim first so that IOCs can be derived and shared with others; additionally, blocking IOCs has a very short half-life.
  • All an adversary has to do is come from a new IP address or recompile their malware so that it has a new hash value (both of which are extremely trivial) and their attacks will sail through defenses that depend on IOCs.
  • As hackers repeatedly gain access to valuable systems and data using the same methods, cybersecurity teams continue to chase after them to secure compromised systems.
  • Very little cybersecurity effort is put towards addressing the methods used by adversaries; instead, security teams are locked in a pattern of waiting for inevitable attacks, trying to minimize the damage they cause, ensuring that remediation occurs as quickly as possible, and blocking only exactly identical attacks.
  • Incident response only helps prevent attacks that exactly replicate past ones.
  • a more proactive, sophisticated approach is needed. It will need to be designed to successfully recognize adversary methodology (and all the manners in which an adversary attempts to obfuscate their methodology) before attacks occur and at a meaningful scale.
  • Instead of seeking discrete, static IoCs based solely on what has already occurred, proactive cybersecurity analysts can instead use the intelligence they have derived about adversaries’ methodologies – commonly referred to as tactics, techniques, and procedures (TTP). 
  • From these TTPs, analysts can identify the general form and components of an adversary campaign. In addition, they can determine abstract indicators like how the adversary is attempting to hide his actions. 
  •  A proactive cybersecurity tool would be able to recognize possible adversary TTPs and indicators that describe a threat (or threatening behavior) in general terms. The system would then act on any traffic which met this pattern before it reaches inside a network, as the attack occurs, and do so in a way invisible to adversaries.
  • Using this basic model, a cybersecurity tool could truly prevent common exploits before they were executed, and could even predict and protect against future, not yet seen exploits.
  •  
    In the wake of the Marriott International cyberattack, the article presents the issues with the current issues in the methodology of cybersecurity; first explaining the data of how popular they are in the hospitality industry, and what it means for the industry, before going into the process of how a cyberattack happens and the measures taken to prevent it. Traditional cybersecurity is one of an "incident response" which can only be implemented once a cyberattack occurs and can only prevent it temporarily as a hacker can do similar tasks with different IP addresses and new malware. In order to circumvent this failure of cybersecurity, the article offers a new method in which TTPs (tactics, techniques, and procedures), are used to identify certain components of a hacker and identify how they would carry out an attack, before acting on it before the attack would "reach the network".
  •  
    This article discusses one of the largest fears of most hospitality firms, and that is keeping their client's personal information private. Most large companies in this industry have become giant data centers for the personal information of millions of people. Breaches of this type of information place the lives of many people at stake. For example, Marriott International had a security breach of over half a billion of its clients which began in 2014 and was not detected until September of this year. Keeping an individual's information away from malignant forces is just plain business sense and any more attacks of this manner will severely hurt the reputation of the business experiencing it.
msbode

5 Technology Trends Impacting the Hospitality Sector - 4 views

  • The hospitality sector has long recognized the value of technology as a catalyst to providing outstanding guest experiences and reducing operational inefficiencies. Technology is so important to the overall mission of many locations that, despite softening IT budgets in 2017, 52 percent of hotels planned to increase their IT investments while 47 percent planned to spend the same as the previous year
  • The type of technology a location spends its IT dollars on is becoming even more critical, as changing consumer attitudes and expectations continually raise the bar for excellent guest services.
  • Five technologies in particular—service automation, fixed mobile convergence, location-based services, connected meeting rooms, and chatbots and mobile apps—are poised to change the guest experience and create areas of opportunity for hospitality locations to become differentiators and innovators in an already technology-centric industry.
  • ...5 more annotations...
  • With service automation, both customer-facing and customer-centric activities are automated, freeing staff to provide more meaningful guest experiences or enabling locations to work at peak efficiency even with a reduced headcount.
  • One recent study noted 56 percent of millennials and 50 percent of Gen Xers prefer to use a loyalty app over a plastic loyalty card.[
  • In creating a guest experience that addresses the needs of “workcationers” and “bleisure travelers”, hotels and other hospitality sites must provide technologies that will help travelers get their work done in the most efficient and impactful way possible
  • Keeping guests happy from check-in to check-out—and anytime in between—is one of the main tenets of hospitality technology. Location-based services are a perfect example, and one technology that also serves to help the hotel, conference center and other hospitality locations increase their efficiency.
  • In embracing the next generation of technologies, hotels, conference centers and other hospitality locations first must prepare their networks to certify they are able to handle the increase in traffic and demand for bandwidth.
  •  
    In this article the author shares how five trends in technology can improve guest experiences two-fold. One being the ease and convenience offered by technology software that range from easy check-ins, app loyalty programs, augmented reality, adaptive artificial intelligence in chat box just to name a few. Secondly, by having these technologies made available will increase interaction time between guest and staff, hence offering phenomenal guest experiences that can't be matched. Moreover, the author stresses while these trends would be great to implement, it is as equally important to ensure that the hardware such as the network are able to support them otherwise the hotel's efforts to improve services through technology would be futile.
tgood006

How Hotels Can Spring Clean Their Information Security Policies Ahead of the Summer Tra... - 8 views

  • Shockingly, nearly a third of hotels (32%) admitted they currently have no known policy for storing and disposing of documents
  •  
    Memorial Day weekend will soon be upon everyone and with summer officially kicks off. This article talks about how hotels can clean up and do better to protect their guest personal information. A few years ago, all major corporation were required to adopt General Data Protection Regulation (GDPR) regulations which helped some hospitality companies. In my current capacity with Marriott International as a Workforce Administrator we were required to schedule all customer facing associates for training on GDPR. Prior to Marriott acquiring Starwood hotel company they had their own data hacking which caused an increased expense for Marriott to let customer know they were doing all they can to stop the data breach and protect their personal information. They also created a dedicated call center for this effort to let guest know that they will continue to put protecting their personal information as a high priority. This article outlines how hotels can prepare for increased guest traffic and protect their guest personal identical information. One of my responsibilities as a Workforce admin is to handle staffing for all of Marriott International Customer Engagement Centers. Employee training on GDPR is required every year for Marriott associates. Training employees on how to better protect guest personal information is more cost effective than dealing with a data breach due to negligence of an absent-minded employee. Guest expect to know their personal information is going to be protected. This allows them to have piece of mind. Leaving a clear and clean area allows for guest to feel that their information is being protected. Imagine walking up to the front desk and finding the previous guest personal information cluttered in view. This will make the current feel their personal information will left unattended and viewable to the guest to walk up causing nothing but anxiety attacks. Unable to enjoy their summer vacation. Guest expect that the overall security of the hotel
  • ...1 more comment...
  •  
    32% of companies not having a known policy is startling considering that 77% of Americans find it to be important to them. Yet another IT issue the states finds itself behind the curve on.
  •  
    Another point as for the "clean desk" policy goes, it also needs to include stricter policies on securing credit card information. It should not be written down or repeated on the telephone. In an open environment sound can carry and unwanted parties can hear. Cell phones should be stored away from the desk, because cell phones are in itself a potential security breach.
  •  
    Our hotel as well has reinforced the clean desk policy. I remembered the data breach for Marriott it was in most major news channel and at work for several months we had the same questions from our guest requesting more information. As you stated a hotline was created and of of course the most surprising for me was the acceptance from our guest. Main responses were, with the new technology advance world we've coming and going into that is something we all have to face.
melin001

The Future of the Hotel Industry in 2020: A session with Peter O'Connor - 0 views

  • linked to this lack of integration is data protection and privacy. Hotels have been a prime target for hackers and therefore there are severe limitations in place with regards to what can be stored on the guest. This limits any guest-centric, data focused development
  • Direct bookings are more expensive to obtain than ever before. Why? Hotels are simply not getting enough direct business to water down the costs of driving the traffic, developing websites and converting the customer
  •  
    The Future of hotel industry on 2020 reflecting the growth of peer to peer such as AirBNB, Hotels need to use all this data to be hand of the game or keeping up other industries. 
jasdhami95

5 Tips to Activate Your Ecommerce - 1 views

  • Keep Communicating With Your Guests
  • consistent social media updates
  • establish a connection
  • ...7 more annotations...
  • clearly outline what your property is doing to ensure their safety,
  • Utilize your social media networks to inspire travelers as travel begins to resume
  • re-birth of the road trip and similar drive market demand.
  • keyword rankings have not dropped in kind,
  • Planning for that pent-up travel demand, however, will require a data-first approach.
  • Property's can also run promotions and specials
  • creating your target audiences to deliver relevant messaging
  •  
    This article discusses five ways to stimulate Ecommerce which includes corresponding with guests, remaining active on social media, not letting your SEO go on leave, devising media budgets and targeting, as well as employing the help of an expert. The author emphasized staying in contact with your customers whether it be through your website, social media, or email. The intention is to stay connected with your guest so that when it is time for them to choose a hotel, they will choose yours. Social media can be used as a tool to entice your future guest and keep them interested in your property. Keeping search traffic up for your website will also ensure people continue to look at your property. Keep in mind the kind of travelers that will come to your property, and tailor your advertisements, messaging, and offers to meet the needs of those travelers. And lastly, if needed, do not be afraid to enlist the help of an expert. This article is meant as a guide for getting one's Ecommerce back on track during these hard pandemic times.
  •  
    My opinion on this article is that E-commerce has been a huge hit as of lately and it is time for this type of trend to follow in the hospitality world. There is a huge shift from walk-in business to online bookings and the best way to show guests the improvements to the property would be through email and social media presence. This would give properties a competitive advantage when it comes to OTA bookings.
« First ‹ Previous 121 - 140 of 179 Next › Last »
Showing 20 items per page