Skip to main content

Home/ Hospitality Technology/ Group items tagged tricks

Rss Feed Group items tagged

14More

Cybersecurity Tactics for a Hotel Industry that's Under Siege - 0 views

  • Credit card fraud and identity theft should remain high on the hotel and lodging industry’s radar. Just ask Starwood Hotels & Resorts Worldwide (including their Westin, Sheraton and W Hotel brands), Hilton, Hyatt and the Trump Hotel Collection, all of which were victims of highly publicized, major breaches in the hospitality industry last year. 
  • Hotels need a ‘toolbelt’ of various security technologies that can be used to prevent malicious attacks. A managed firewall is essential, blocking dangerous traffic from coming onto the network and preventing sensitive data from being exfiltrated, or sent, to the hackers.
  • In the breaches mentioned above, point-of-sale (POS) systems were attacked and malware launched to acquire cardholder names, credit card numbers and expiration dates.
  • ...7 more annotations...
  • It can be difficult and expensive to hire and retain an IT security team
  • One way to implement these advanced toolsets includes outsourcing to a managed security firm specializing in this type of service
  • POS systems are a weak security point for many networks because they are constantly in use — and aren’t always patched, updated or protected from vulnerabilities as frequently as required.
  • personal details for hotel guests are frequently stored in a variety of locations, including billing, facilities, restaurants, etc.
  • otels are made even more vulnerable thanks to POS system provider breaches
  •   Phishing remains a particularly popular tactic used by hackers everywhere, including those that are targeting the hotel industry to trick both prospective guests, who give up credit card and personal details, and insiders, who then give up valuable login credentials.
  • File Integrity Monitoring (FIM), Unified Threat Management (UTM), and Security Information and Event Management (SIEM) should also be considered
  •  
    This article talks about how there is a serious concern in the hotel industry when it comes to credit card and identity theft. They talk about how all the major brands in the hotel industry were all victims of highly publicized, major breaches in the last year alone. Also, including airline and banks, hotels maintain a wealthy amount of database of personal and financial data. For example, with new technology systems being created, POS systems are a weak security point for many networks because they are constantly in use and are not always updated or even protected from vulnerabilities. The article talks about personal details for hotel guests are frequently stored in a variety of locations including restaurants, facilities, and government buildings, so hackers have a greater possibility to access your personal information. The bigger hotels are in more danger because of the volume of guests that come in and out of the location. Smaller hotels should be concerned not just about their security but also by ransomware, an increasingly favorable tactic to extort hoteliers by hackers who encrypt the hotels data making it inaccessible until ransom is paid for. I believe hotels need a toolbelt of various securtiy technologies that can be used to prevent future malicious attacks. I think by managing and implementing a firewall is essential which helps get rid of dangerous traffic from coming onto the network and preventing sensitive data from being hacked.
  • ...1 more comment...
  •  
    This article talks about the weakness and vulnerability of POS systems involving safety. It mentions the security breach that few companies, such as Starwood Hotels & Resorts Worldwide (including their Westin, Sheraton and W Hotel brands), Hilton, Hyatt and the Trump Hotel, faced last year (2016) involving credit card fraud and identity theft through their POS systems. It mentions how point-of-sale (POS) systems are not complete safe and how vulnerable they are because they are constantly in use and aren't always patched, updated, or protected from vulnerabilities as frequently as required. It suggests that enterprises should outsource their cyber security management to minimize costs, considering that is extremely expensive to hire and retain IT security team.
  •  
    MOD 10: This article discusses the main tactics of cyber hackers that target hotels. Point of sale (POS) systems are easy targets for hackers due to their constant use during operation hours and because of that their security measures aren't always up to date. Hotels have large data banks since they're storing consumer profile information such as home addresses, phone numbers and credit card numbers. There's a large risk when it comes to security breaches within franchises because they have access to their parent company's regional, national and global systems. If their systems are hacked and breached, then that puts the whole system of the brand at risk. Security breaches within a system can also damage a brands reputation with the public. According to the article, "Recent major breaches at Fortune 500 companies and household names across the retail, restaurant and hotel sectors demonstrate that anti-virus, anti-malware and firewalls alone are not enough to secure businesses from the ever-evolving threat landscape." Smaller properties are even at a greater risk because not only do they have to monitor their compliance with PCI but also monitoring their security systems for their database and PMS system. Some of the recommended software's that should be used by hotels looking to be proactive with their company's cyber security is File Integrity Monitoring(FIM), Unified Threat Management(UTM), and Security Information and Event Management(SIEM).
  •  
    This article explores the different tactics hotels should use after a cyber attack. The article mentions several different type of attacks such as Phishing when hackers trick customers into giving up their login credentials. Ransomware, when hackers encrypt data making it unusable and inaccessible for the hotel. Not one solution but rather companies should be equipped with a series of technologies from firewalls to file monitoring programs. Some of these technologies, like SIEM requires an intelligent IT team to have the capabilities of analyzing and monitoring the reports produced. This may be more difficult for smaller businesses to implement and maintain.
3More

7 Things You Can Do to Make Internet Explorer More Secure - CIO.com - 0 views

  • How well Internet Explorer--or any Web browser, for that matter--protects against attacks and malware greatly depends on whether you keep it up to date and have the right security settings. Here's how to take the proper security measures with Internet Explorer 9 and 10.
  • IE lets you set custom security settings for different zones: Internet, Local Intranet, Trusted Sites, and Restricted Sites. When you visit a website, IE automatically classifies it as in the Internet zone. The exceptions are websites hosted by your local network (say, a site set up for use on your company's network)--then it's Local Intranet--or sites that you've added to the Trusted or Restricted lists beforehand. You can set each zone to a predefined security level and customize the settings as well.
  •  
    The article by Eric Geier is mainly an informative piece as well as a basic tutorial of Internet Explorer Settings. Geier focuses on security, the core of a browser's purpose next to actual browsing. He provides a few tricks that aren't always set for users, such as tracking protection, a feature that protects your privacy and reduces pop-ups, especially from unwanted ads. The largest focus of the article is what I find most important, and it's most talked about for a reason. Staying on top of a browser's update is essential for not only the browser's performance but most importantly for your computer's security. To put it into perspective, every time you get on Internet Explorer, it's like leaving your house. If you update your browser constantly, you are always making sure the door is locked. But the longer you wait between updates the more likely the door will be unlocked. And if you completely forget to update for an extended period of time it's like leaving the door open for malware, or malicious software.
4More

Selecting a Hospitality Call Accounting System - 1 views

  • The trick to selecting a hospitality call accounting system is to know how to eliminate unsuitable options quickly by asking the right questions.
  • The trick to selecting a hospitality call accounting system is to know how to eliminate unsuitable options quickly by asking the right questions. There's no shortage of supply just suitable solutions. Different properties have different requirements and we have yet to find a solution that fits every type of property from a hotel chain through to a single location motel. The best way to choose between the dozens of call accounting systems is to have a checklist identifying requirements in descending order from mandatory through to "nice to have." If a short-listed candidate doesn't satisfy a critical requirement waste no more time, move onto the next and repeat the cycle. The objective is to identify one or more call accounting systems that satisfy all mandatory requirements. It's only at that stage that cost should be considered. Cost is irrelevant if a "solution" can't do the job. If you're lucky enough to find two or more options that are fully compliant then cost becomes the final consideration.
  •  
    This article introduces brief suggestions about how to select a hospitality call accounting system. And the best way is to have a checklist identifying requirements in descending order from mandatory through to "nice to have." Such as, (1). A call accounting software package must be proven and specific to the hospitality industry. (2). Because of the VoIP (Voice over Internet Protocol) PBX (private branch exchange) has now superseded the TDM (time-division-multiplexing) PBX, so the solution needs to be compatible with hotels' existing PBX and whatever comes along in the future. (3). Hotels should choose different call accounting systems based on Single-site or multi-site businesses they have. (4). And the hospitality call accounting systems should integrate seamlessly with all major accounting software packages. (5). Software updates should be provided regularly (6). Competent 24x7 support is essential to assure hotels cost recovery and protect against revenue loss. (7). Software is easy to use and clearly but succinctly documented due to the high turnover of staff in hotels. And a web interface is a nice to have, but not an essential feature. Of course the best choice can vary because of different operation in hotels.
  •  
    For hotel managers, there are dozens of hospitality call accounting options to choose from and depending on the nature of a particular operation the best solution will vary. This article offers a checklist for selecting a hospitality call accounting system.
16More

Yes, Smaller Ecommerce Stores Can Evolve (and Prosper) | Practical Ecommerce - 0 views

  • Roughly a quarter of the global population will reportedly shop online this year. That’s an increase of 40 percent since 2014, with more growth to come.
  • Know how your audience uses smartphones.
  • Email marketing remains critical for ecommerce, but Messenger, text, and app notifications are becoming more commonplace for shipping and delivery confirmations.
  • ...11 more annotations...
  • Get social now.
  • Social media drives sales referrals for many companies.
  • Offer more mobile payment options
  • . Mobile wallets and payment apps are much easier to use than credit and debit cards.
  • Use the right trigger words.
  • AI-powered communications make quality customer service more affordable.
  • Analyze what is requested from your customers then create customized responses. The key is to make your bot mimic human dialog.
  • Embrace chatbots.
  • Study the words and phrases of your larger and successful competitors to ensure your product descriptions and customer-service pages evoke the right emotions.
  • Present compelling images and videos.
  • Recognize trends that impact your business.
  •  
    This article gives tips and tricks for small businesses and how they can grow their ecommerce business. Tips include using social media, knowing your audience, being mindful of wording, and using chatbots, are all tips that smaller business can use to drive customers to their businesses. Online shopping keeps growing and growing so it is important for businesses to know how to stand out against their competitors. Understanding their customers and making adjustments to better serve them, will separate the winners from the losers.
  •  
    I love how this is showing where the trends are going and business is evolving. It seems crazy to think there is more than the way we currently use the internet, but there is so much room for expansion in this market. Good article and read. Thanks for sharing.
13More

4 ways to use HR systems to communicate as COVID-19 develops - 0 views

  • As HR teams navigate the new remote work environment caused by COVID-19, an organization's human resource information system has become a critical tool for keeping employees connected
  • Managers are on the front lines of employee relations, so they are critical in facilitating business responses to COVID-19
  • Here are four ways HR can employ an HRIS during the COVID-19 pandemic.
  • ...9 more annotations...
  • Use employee contact information
  • Up-to-date employee contact details are important so HR can share company news in a timely manner.
  • anagers will then be able to alert employees about new working hours, COVID-19 infections within the company and office closures.
  • Show policy changes
  • HR teams should keep the HRIS updated to reflect new and revised policies related to COVID-19.
  • Help the company stay on track
  • HR should ensure employees know how to view schedules and record time worked remotely. This may be a new process for employees who relied on their manager to post this information in a paper-based format.
  • Keep employees engaged
  • An HRIS system's collaboration or community features can provide managers with an environment that brings teams together to work on projects or just gives employees a way to keep in touch during a period of social distancing and remote work isolation.
  •  
    These are some tips and tricks for managers to use in order to really utilize the full potential of an HRIS during this pandemic. With remote working become the new reality, it is important to still remain on the same page with your team.
3More

A Market Adjusting to Ease of Use: The Growing Surge of Mobile Bookings in the Hotel Pr... - 0 views

  • With 24% of online hotel bookings coming from mobile phones and 55% to 66% of those bookings being made by tablets, mobile apps for the Hotel Property Management System (HPMS) market are becoming integral to the success of the business, according to Info-Tech Research Group. An HPMS Vendor Landscape report, published by Info-Tech Research Group, ranked Infor and MICROS as Champions in a market that is learning new tricks.
  • "Making reservations through mobile devices, specifically tablets, is becoming more and more critical in appealing to customer booking preferences
  •  
    This article points out that there is a big growing of mobile bookings in the hotel property management system market. Leading the way, mobile apps play a major role of making the successful business. So integration with major social media channels and customized marketing strategies will be more focused and improved. As the top two ranking in the vendor landscape report, Infor and MICROS both are doing such a great job for this. Other hotel property management vendors keep on an eye in this report as well and try to evaluate this to share the markets.
1More

Hardware subsidies for POS systems? - 0 views

  •  
    Subsidizing a product to get a long-term use commitment from a consumer base is nothing new; it existed before high tech hardware was made affordable by software or service agreements. Think about the razors you buy, assuming of course that you're not a fully bearded male. The initial cost of the razor isn't all that expensive, but replacing the razors for a month costs upwards of twice the razor itself. And if you've shopped for a printer lately, you know the same strategy applies here. The printer itself isn't the greatest expense over the life of the asset; the ink, which is required and usually specific to the device itself, is where you will spend the most money. The most well known form of subsidization, or at least most glaring, comes from the coupling of cell phones and cell service providers. An iPhone, for example, costs a lot more than most people actually pay for it. The new iPhone 5, the basic version with 16GB will run you $649. Not to mention the cost of new adapters, chargers, cases, etc. However, if you commit to (or renew) a two-year service contract with AT&T, Verizon, or Sprint, the phone itself costs $199. How does this work? The same way the printers and printer ink work. The service providers (i.e. AT&T) subsidize the majority of the cost of the phone in order to lock customers into a contract that ends up costing much more in usage and data charges over the life of the contract. The idea is to make the cost of entry relatively cheap. Then, the cost the company loses at the initial purchase is recouped through purchases, or service charges, over the long term. Unscrupulous? Not really, although some would say so after receiving their phone bill. But that has more to do with not being aware of the stipulations of the contract you sign to get the cheaper phone at the outset. Although I personally find it annoying, I try to look at as something akin to amortizing the asset, and remember that, at least for me, a monthly fee
11More

Hotel Lock Firm's Security Fix Requires Hardware Changes For Millions Of Keycard Locks ... - 4 views

  • Good news for the security of hotels and travelers: Onity, whose keycard locks can be found on at least four million rooms around the world, has a plan to fix a security flaw
  • Black Hat security conference by Cody Brocious, a Mozilla developer who showed that he was able to insert a device he built for less than $50 into the data port on the underside of Onity’s locks, read their memory to find a decryption key, and use it to gain access to the lock’s firmware and trigger its open command in a matter of seconds.
  • The company’s response to that epic security bug has two parts–a quick fix, and a more rigorous one, both of which it plans to make available by the end of August: First, it’s issuing caps that cover the data port Brocious’s hack exploited, which can only be removed by opening the lock’s case.
  • ...6 more annotations...
  • “If such a significant issue were to exist in a car, customers would likely expect a complete recall at the expense of the manufacturer,” Brocious adds. “I can’t help but feel that Onity has the same responsibility to their customers, and to customers staying in hotels protected by Onity locks.
  • “We want to assure you that Onity is working on providing you with a solution that will address any potential risks related to the alleged vulnerability of these locks,”
  • But since then, two hackers who asked not to have their names revealed have claimed in emails to me that they independently replicated the exploit and refined it, so that it now works on any Onity hotel room lock. Brocious tells me he’s spoken with eight or nine hackers who have all been able to replicate his work to some degree.
  • Onity isn’t the only one to come under fire in wake of its security flap: Brocious has also been criticized for failing to warn Onity ahead of his Black Hat demonstration and for selling a licence to use his Onity-hacking trick to a locksmith training firm for $20,000 long before he made his findings public.
  • Onity issued a statement responding to last month’s presentation at the Black Hat security conference by Cody Brocious, a Mozilla developer who showed that he was able to insert a device he built for less than $50 into the data port on the underside of Onity’s locks, read their memory to find a decryption key, and use it to gain access to the lock’s firmware and trigger its open command in a matter of seconds.
  • Onity will offer its customers new circuit boards and firmware that ostensibly fix the problems Brocious demonstrated–But Onity is asking owners of some models of its locks of some to pay a “nominal fee” for the fix, while offering others “special pricing programs” to cover the cost of replacing components.
  •  
    In the article, "Hotel Lock Firm's Security Fix Requires Hardware Changes For Millions Of Keycard Locks," it talks about how Onity has a plan to fix a security flaw that allows hackers to insert a homemade device into the lock and open the door in a matter of second. The only problem with this new plan is that it requires hardware changes to every affected lock and it even might require it customers to pay for it. "Black Hat security conference by Cody Brocious, a Mozilla developer who showed that he was able to insert a device he built for less than $50 into the data port on the underside of Onity's locks, read their memory to find a decryption key, and use it to gain access to the lock's firmware and trigger its open command in a matter of seconds." It seems crazy that hackers can break in so easily, so maybe this expensive security could be worth it in the long run. The company responded with two different parts, first, it's issuing caps that cover the data port Brocious's hack exploited and the second more substantial: Onity will offer its customers new circuit boards and firmware that ostensibly fix the problems. Before reading this article I had no idea that it was so easy for hackers to get into hotel rooms, this really makes you think twice before you decide which hotel you will be staying at!
  •  
    The hardware of hotel is the locker. This article showed us there is a new key card locker was discovered by Onity's. It is more security but it need to change all the affected lock. It is a lock built for less than $50 into the data port on the underside of the Onity's locks. The company's response to that epic security bug has two parts-a quick fix, and a more rigorous one, both of which it plans to make available by the end of August: First, it's issuing caps that cover the data port Brocious's hack exploited, which can only be removed by opening the lock's case. To further stymie hackers who would try to open the locks and remove that cap, it's also sending customers new, more obscure Torx screws to replace those on the cases of installed locks.The company's response to that epic security bug has two parts-a quick fix, and a more rigorous one, both of which it plans to make available by the end of August: First, it's issuing caps that cover the data port Brocious's hack exploited, which can only be removed by opening the lock's case. To further stymie hackers who would try to open the locks and remove that cap, it's also sending customers new, more obscure Torx screws to replace those on the cases of installed locks. The safe issue became the most important issue of the new products. It will cost more money of each hotel and it is really safe or not is still a question. 
8More

Hacker Will Expose Potential Security Flaw In Four Million Hotel Room Keycard Locks - F... - 5 views

  • The next time you stay in a hotel room, run your fingers under the keycard lock outside your door. If you find a DC power port there, take note: With a few hacker tricks and a handful of cheap hardware, that tiny round hole might offer access to your room just as completely as your keycard
  • Using an open-source hardware gadget Brocious built for less than $50, he can insert a plug into that DC port and sometimes, albeit unreliably, open the lock in a matter of seconds. “I plug it in, power it up, and the lock opens,”
  • The ability to access the devices’ memory is just one of the two vulnerabilities Brocious says he found in Onity’s locks
  • ...1 more annotation...
  • he company also uses a weak encryption scheme that allows him to derive the “site code”–a unique numerical key for every facility–from two cards encoded one after another for the same room
  •  
    A security researcher discovered that he could unlock certain electronic key card entry devices used at millions of hotels by inserting a plug into the small port in the bottom of the key card device and unlocking the door. When he inserts the plug and turns on his device it triggers the mechanism inside that key card device and opens the door in seconds. Granted when he tested this at a conference he was only able to open 1 of 3 doors but it was still enough to show the flaw in the system. It doesn't sound likely after reading the article that there is an easy or cost effective fix to this problem because so many hotels across the world use these devices supplied by Onity. I think the lesson here is to always be vigilant in securing your valuables in any hotel room. Any time new technology is installed there is going to be someone right behind trying to hack it or find the security breaches.
  • ...1 more comment...
  •  
    Dawn, I wrote about the follow-up article regarding this issue. I can not believe that it has taken Onity this long to correct the issue. I can't imagine why Marriott and other companies haven't address their guests regarding this concern. I understand the negative impact this could have to the business, however the companies should keep in mind safety.
  •  
    Nelson, I went back and read your article, very interesting to see the follow up but I am surprised that it has taken this long to come out. I wonder if this would have been more publicised if it would have put more pressure on Onnity to fix the problem without putting financial burden on the hotel owners? I am curious now to see if my own company has been effected by this issue.
  •  
    That is scary that you can think you are secure and anyone can hack the system and open your hotel room door. Now paranoid people that think they may be robbed by hotel staff, also have to think of outsiders, not even staying at the hotel. Anyone can enter hotels now a days and start opening doors like a lottery system, until they strike gold. The moral, be vigilant while on vacation, because there may also be someone eyeing your stuff. Also, if you have an in room safe use it.
8More

Are Hotel Groups Ready for Total Transparency in Traveler Reviews? - Monday, 16th Janua... - 1 views

  • s a particularly complicated dilemma for hotel groups, which must answer not only to guests but to owners, members and franchisees. One black sheep in the family can tarnish the reputation of other properties and the brand as a whole.
  • Social media changes the rules of marketing.
  • Travelers don’t expect perfection, but they do expect transparency and authenticity.
  • ...4 more annotations...
  • Four Seasons, which this week introduced a “Reviews at a Glance” widget on property pages as part of its new (and vastly improved) website.
  • reviews are listed by star rating, with the best first.
  • Accor was the trailblazer, having integrated TripAdvisor reviews and ratings on Accor.com back in 2010.
  • Unlike Starwood, Marriott doesn’t list the best reviews first, but, bizarrely, lists the oldest reviews first.
  •  
    Social media nowadays becomes a very important role in hospitality industry, and most travelers will search a third party's property reviews like Tripadviser before making their decisions to choose a hotel. You can find either good or bad comments for the hotels around the world from it, and people believe that it has some influence on the travelers' decisions. However, most great hotel groups do not have a website for that use, and Daniel Craig thinks it is because hotel groups not only take care of the customers but also the owners, and as we know hotel group also has franchisers, so if just one unit not operated well, all the other properties will also suffer the reputation issue. But there are also some hotel groups try to do that but with some tricks. Starwood allows the guest to post reviews for some of its brands and list by ratings with the best first, and Marriot set up a new website for its members to post reviews and list by time with oldest first. In my opinion, most hotel groups focus so much on the influence of their brand loyalty, which is also very important, but comparing with the increasing influence of words of mouth that I list below, I strongly agree that those hotel groups need to have a trustful review website for their own ASAP: 1. 90% of consumers online trust recommendations from people they know; 70% trust opinions of unknown users (Econsultancy, July 2009) 2. 83% of all holiday shoppers are influenced by customer reviews. (ChannelAdvisor "Consumer Shopping Habits Survey", August 2010)
4More

The Robots Are The Chefs In This Japanese Restaurant | Singularity Hub - 0 views

  • ou can see other customers in the restaurant as they experience the restaurant in their own way – some mesmerized by the robots, others focused on their food and seemingly oblivious to the fact that the robots are even there.  Its an awesome scene.
  • The robots are fully autonomous, taking a customer order and cooking it from start to finish.  This includes boiling the noodles, pouring broth, adding spices and toppings, and so on.  The orders are complex too, requiring the robots to take customer preference for amount and type of sauce, salt, noodle, and so on.   The finished product is handed off to a human server who brings the food to the customer’s table.  The irony could not be more real as we witness the lowly human in the role of a mere server while the robot takes on the cooking.
  • The restaurant, called FA-men (pronounced Fu-a-men) based in Nagoya, Japan, takes its name from the phrase “Fully Automated raMEN” says Ni-Lab.  Not content to simply sit around when there are no orders to cook, the robots can be seen doing tricks and even performing pretend combat with a sword (knife) and a shield (plate) in homage to Manzai, a  style of stand-up comedy in Japan.  If you know Japanese, or are just curious, you can check out FA-men’s website.
  •  
    Here we are, this post make the unattended POS a child's toy in the hospitality industry, look at the robot chef! The customers come into this restaurant to enjoy their meal, and suddenly they realize that their food are prepared by robots! from boiling the water, choose the customer's sauce according to the order... one thing I know, is that they will probably never mess up the order. The dish then is hand over to the HUMAN server to bring to the table. When is the last time you hear about this word? A HUMAN server? I think that in the near future, we can walk into a restaurant and find out that there is no HUMAN server, or HUMAN cook, or ever HUMAN manager. But the customers are still HUMAN though.
19More

Why Women Are Leading The Growing Natural Wine Movement - 0 views

  • “boys club.”
  • emerging market dedicated to organic ingredients and sustainable practices.
  • With such clean ingredients, the end product isn’t as stable as it’s more traditional counterparts, and therefore needs to be sold relatively soon after production.
  • ...15 more annotations...
  • A recent study conducted in conjunction with UCLA found that organic labels yielded higher taste ratings from wine critics.
  • A Mintel study found that 60% of millennials and 55% of Gen-Xers are concerned about harmful ingredients in their food and groceries.
  • While organic represents less than 5% of the U.S. wine industry, it grew at rates between 10% and 20% per year in volume from 2013-2016, according to Nielsen. In the last decade, the number of organic vineyards tripled worldwide.
  • Women outnumber men as the leading consumer of wine in both retail and restaurants, consuming 57% of bottles in the U.S, reports Nielsen. Of those, 51% of those aged 21-24 say organic factors in into their purchasing wine.
  • (Several studies suggest women eat more nutritiously than their male counterparts).
  • Natural wine is generally lighter and tends towards a funkier, less manipulated consistency.
  • The definitions involve both the environment (how the grapes are tended to, without artificial chemical fertilizers, pesticides, and herbicides) and the winemaking process (with limited or no added chemicals/sulfates).
  • millennials, who constitute 36% of wine drinkers, according to a report by Beverage Dynamics.
  • more subtle, restrained, and elegant than it’s predecessors. “Women’s wine tends to use less of the winemakers’ bag of tricks as far as oak is concerned and different methods to manipulate the flavors of wine,” says Den Haan.
  • “They’re geared to the female consumer,” adds Ed Field, owner of Natural Merchants, Inc., one of North America’s leading importers of organic wines, which counts Whole Foods as client. “There’s not necessarily heavy tannins–it’s more refined.”
  • Magdevski says that in the past, women probably veered away from winemaking in part because of the physicality required.
  • Women might also gravitate towards small, natural producers and local markets since larger operations have long been dominated by men.
  • In 2013, Ann Rabin Arnold founded the Organic Wine Exchange, an organic wine club that’s now available in 13 states with a clientele that is  80% female.
  • larger producers will co-opt it as a smart marketing move. “That’s my fear,” she says, adding, “and my hope.”
  • organic wine is “at the tip of the iceberg” as more and more consumers, especially millennials, actively look for not only healthier solutions, but more distinct dining options.
  •  
    Even though the wine industry was once considered more of a "boy's club", woman are now leading the way in the growing Natural Wine Movement as a market dedicated to organic ingredients and sustainable practices continues to emerge. This is largely due to the fact that women outnumber men as the lead consumer of wine in both retail and restaurant bottle purchases, as well as several studies that suggest that woman eat/drink more nutritiously than their male counterparts. This has led to organic and biodynamic wines growing at rates between 10 percent and 20 percent per year in volume from 2013 to 2016, and organic vineyards almost tripling word wide over the last decade. Being in charge of the Beverage Ordering and Menu Creation at my restaurant, I have seen first hand the increase demand for organic and biodynamic wines. It has become so prevalent that I have begun printing menus with asterisks to highlight which of our wines fall into either of these categories. According to a Mintel Study, 60 percent of millennials and 55 percent of Gen-Xers are concerned about harmful ingredients in their food and groceries. With millennials constituting for 36 percent of wine consumers, according to a report by Beverage Dynamics, it is a essential that both the restaurant and wine industries continue to cater and adept to our consumers wants and needs. It would only make sense that Women are the ones leading this growing trend, as they constitute the majority of the market for it as well.
7More

http://ceur-ws.org/Vol-2443/paper04.pdf - 0 views

    • angelicamm6
       
      There are some relations between publisher, advertiser and user according to the sustainable development principle in web advertisement context in e-business. The following principles should be adopted: * The publishers should use users' knowledge and experience in case of form of advertisement and propose advertisements, if they constitute their source of income. * The publishers and advertisers should allow users, i.e. the recipients of content, portals or websites, to make the decision in case of invasive or not interesting advertisement.
    • angelicamm6
       
      Table 1. Reasons of ads blocking grouped by categories
    • angelicamm6
       
      The research methodology included the following steps:
  • ...3 more annotations...
    • angelicamm6
       
      Apart from banner advertisements, there are also the following types of advertisements: * top layer - advertisements displayed only once in the form of an animation with its sound on by default, * brandmark - it is a variety of a pop-up advertisement, * interstitial - an advertisement displayed as a 10-second full-screen animation, * floating ad - a specific type of a moving advertisement which floats over the website and browsed content, encouraging users to click on it (it can be perceived as a harassment), * watermark - a form of an online advertisement displayed as a background, * trick banner - an advertisement which is actually a form of deception or fraud. It contains a text encouraging the user to click it and which takes the user to a different, infected website.
    • angelicamm6
       
      Table 2. Blocking ads divided into age groups
    • angelicamm6
       
      According to the survey results, about 60% of the surveyed users aged 18-24 block ads: * Age group 18-24 - 56,30% of Internet users block internet advertising, * Age group 25-34 - 32,80% of Internet users block internet advertising, * Age group 35-44 - 9% of Internet users block internet advertising.
  •  
    The articles focuses on the idea of web authors posting free articles and compensating it with ads. But users have ways of either blocking the ads or not really getting ads they care for. Does this defeat the purpose of having free web pages, or are user just beating the system.
18More

10 Best E-commerce Practices for Hotels - SmartGuests.com Blog - 1 views

  • With 57% of all hotel bookings made online and 97% of all travelers searching for a place to stay using the Internet, the importance for hotels to adapt best ecommerce practices is more important today more than ever.
  • 1. Use High Res Photos
  • No guest in his or her right mind would book a hotel without seeing photos of the property first. Beautiful photos is a deal breaker when it comes to almost all hotel bookings. Make sure that you use high res photos on your hotel website and make sure that you upload new ones regularly.
  • ...12 more annotations...
  • 2. Build Your Credibility
  • Let’s face it – there are unscrupulous hotels who don’t care an iota about their guests. They trick their guests, overpromising in terms of their facilities and amenities and delivering sub-par service. This is why a lot of travelers have developed a healthy level of skepticism toward hotels and this is why it is important that you convey credibility on your website.
  • 3. Make It Extremely Easy To Book a Room in Your Hotel
  • 4. Display Customer Service Channels Prominently
  • 7. Ensure That Your Website is Mobile Friendly
  • 5. Make Your Website Easy to Navigate
  • 6. Have a Single Call to Action Per Page
  • Best e-commerce practice dictates that you should always be reachable to answer questions from those who want to book a room with your hotel, but need their questions answered first. Not having this information prominently displayed on your site can spell a difference between a non-booking and a successful booking.
  • 8. Ensure That Your Website is Secure for Financial Transactions
  • The Internet is always under attacked by various security threats and one of the issues that always make people wary is the security of their financial information online. This is why it is important for you to demonstrate that your website can handle financial transactions safely.
  • 9. Always Have an Email Collection Mechanism in Place
  • 10. Use Persuasion Elements
  •  
    With the majority of bookings done through the internet, hotels need to find the best ways to make their websites attractive and engaging for a guest. Here are the ten e-commerce ideas that a hotel should strongly focus on. Number one, high quality images. A guest wants to see your property, and see the amenities that are offered. Provide a clear image of these items to them, so that they are aware of what makes the location great. Two, focus on the location's credibility. and build a reputation of trust for your location. Guests do not like to be fooled, so you must prove that you have integrity to gain business. Three, simplify the booking process. For many people it might not be an issue to navigate through the internet and book a room, but for some people it is. Make sure that the process of booking a room at your sight is very easy, and is comfortable for any guest. Four, integrate customer service channels. If your guests have questions before booking, then try to answer them as fast as possible. This works with the second step of improving credibility. Five, not only should you make the booking process simple, but the navigation process as well. Your layout should be clear, and guests should easily be able to figure out where it is that specific information is found. Six, have only one call to action per page. A call to action is a phrase that when clicked on, creates a certain thing to happen. Like clicking on a button that says "Reserve now", and then being led to a reservation page. It is important to only put one on a page, because several can seem cluttered and confusing. Seven, make the site friendly to cellular devices. Many of the reservations are done last minute, and on a cellular device. Make sure this is easy for your guests to do. Eight, the importance of PCI. There are many threats out there to our finances, and as a place of business it is up to you to secure the financial information of the guests, to avoid any fraud or theft. Nine, optimize o
  •  
    In today's society it is extremely important for the hotel industry to make use of the e-commerce technology. This article focuses on the ten best e-commerce practices. Best practice number one is to use high resolution photos that are a true representation of your hotel. These photos should be frequently changed and of good quality. Secondly, show your guests that they can trust you and your website, by building credibility. E-commerce is designed to make the process better, thus, thirdly, ensure that it is easy to book a room through your website. The fourth best practice is to ensure that you are clear about ways that your customer can reach out to you for information. show that you are accessible. Next, the author mentioned the importance of making your website user friendly and easy to navigate. Additionally, have one call to action button so that customers are not confused as to where to make their selection or booking. Consumers are now using cellphones more to book hotel accommodations, thus, another best practice is to ensure that your website is mobile friendly. Internet security is a concern for consumers. Best practice number eight is to ensure that your website is secure for financial transactions. The ninth best practice is ensure that you make use of email marketing. Your website should have the ability to collect emails from each user. The final best practiced listed in the article is to use marketing techniques like persuasion elements that go the extra mile to convince guests to book their hotel. The ten best practices outlined were listed for hotel operates to analyze their website and identify ways to improve if necessary.
  •  
    My company works specifically in the short term rental space, and I wanted to comment on number 9 and offer some insight and results from properly managing your email list. First and foremost, having an email list increases return customers to your platform or rental site by over 300%. Most companies in this space have spent countless hours creating and defining specific messages to potential guests, which begin from the first time they visit the site, all the way until they checkout. Each time these touch points, through email or other communications, increase the likelihood of the guest to use the rental company, condo association, or hotel year in and year out. A new method of communication that is being used industry wide is through text messaging. I believe that this form of e-commerce will enable faster delivery of information to customers and allow managers to personalize experiences at the hotel or property. This follows along the lines of remote locks and other services that are technology based rather than requiring personnel to execute, greatly reducing overhead costs.
5More

Green IT: Going Green - Does your Company Care? | TechNet Magazine - 1 views

  • The real trick to achieving green IT is to accept the fact that your current IT assets are fixed. You’re not going to lose a lot of physical servers. What you can do, however, is get a better idea of your current servers’ utilization and a feel for which servers are more efficient. Identify which of your servers produce more workload for less energy. By identifying the most efficient machines and those with extra capacity, you can start to slowly consolidate tasks—using virtualization, in most cases—and perhaps reduce energy costs a bit.
  • Typically, green IT simply means building an IT infrastructure that uses fewer resources—most notably energy.
  • Many companies profess a concern for the environment, but few are remodeling their data centers or taking major steps toward greener technology.
  • ...1 more annotation...
  • Try to ensure that every watt is being used to full advantage by moving older, lower-efficiency servers into virtual machines running on newer, higher-efficiency ones.
  •  
    This article describes how many companies are reluctant to add "green" initiatives. However, it notes that this is a growing and important area that many companies are deciding to become involved in because of its importance. Moreover, it points out that by reducing the power consumption of computers in a business the effect is to produce a green result. Additionally, this not only saves the company money, but it also has the result of being a good public relations outcome. Then, the company can advertise how it is following a greener path.
3More

The Keys to Marriott's Success | CIO - 0 views

  • The Keys to Marriott's Success Long before the economy went south, Marriott had a reputation for finding creative ways to wrest the most value from every IT dollar.
  • The devil is in the details—success is in the system.-The Spirit to Serve Metrics drive Marriott. Talk to an IT associate on any given day, and he can tell you exactly how much business the company processed via its systems that week per second ($3,568 when this reporter visited).When implementing the PeopleSoft enterprise service automation module for project tracking and time reporting within IT, for example, programmers developed a tool so that project and productivity metrics are automatically computed after time is entered. Another rule for metrics is to make sure that the right people get the right data in a form that’s meaningful to them. "You need to measure a lot of things, but the trick is to publish the right information to the relevant audience," says Melnick. "Having Marriott.com up and running is not as important as the dollars running through it," explains Keppler. Melnick adds, "For each system we try to focus on the core metrics. And that changes. What might have been important the day you go live becomes a nonevent a few weeks in." For example, five years ago the critical metric for Marriott.com was uptime. Today, it’s how much business the website books. Last year, metrics fueled the IT department’s decision to invest in an upgrade to the site that would make it easier to reserve rooms. Today, more than 75 percent of rooms booked online come through Marriott.com, saving the company $12 million annually.Keeping its eye on the numbers lets Marriott revisit business cases for IT projects each quarter. "The project itself may not change that much, but something external may happen—something like SARS, something from the competition," Melnick explains. "Just because you start a project and it’s on track doesn’t mean you want to keep the same pace. There may be something that comes up that’s even better." Success is never final.-The Spirit to Serve Though the IT department’s resourcefulness is helping keep Marriott afloat during hard times, Wilson and his peers aren’t taking anything for granted. They say they can’t let their culture of resourcefulness wither away when the economy turns around. They’re reminded of how easy it could be to let their guard down each time they flip through Mr. Marriott’s book in which he quotes Somerset Maugham: "The unfortunate thing about this world is that good habits are so much easier to give up than bad ones."But Wilson believes the principles and procedures put in place for prudent and resourceful IT decision making should keep the company on the straight and narrow and ahead of the competition."I have a firm belief that the only real sustainable competitive advantage we can get with IT is making sure our people understand conceptually what IT can and can’t do and apply it better than competitors," Wilson says. "Anything we do in IT, a competitor can install. What they can’t capture that quickly is having a team of people throughout the company that really gets this and follows it all the way through. That’s sustainable."Marriott has valued resourcefulness—on paper if not always in practice—for decades. But resourcefulness is not an end in itself. It’s a tool one uses in the ongoing construction of value, a project that’s never finished. Or, as Mr. Marriott says succinctly in his book, "Success is never final."
  •  
    The article elaborates how Marriott success lies on I.T. as they invest wisely. This states that even they are forced to do more expensive and intensive system upgrade, the result is always a success. It has been stated that information technology is significant as it evolves as they have to deal with all the system update, conversion, implementation and transition.
8More

A Necessary Evil: A Look at The OTAs - Hotelier Magazine - 0 views

  • So, what’s the issue? For one, the whopping commissions the massive web-based entities take, routinely in the 20- to 30-per-cent range
  • Hotels won’t give them any parameters at all, he points out, and a different pricing model will have to emerge. “They won’t necessarily take commission or such, but they might charge you just to drive people to your site. It’s a scary idea.
  • The net result, says Estis Green, whose company conducts hotel data analytics, is that hotels can’t really compete on price alone anymore. It’s why, in today’s new reality, competition is a game played with other factors, including value-added services, rates based on multiple nights’ occupancy or other inspired — even desperate — offers devised by hoteliers.
  • ...5 more annotations...
  • The ultimate trick to navigating the new landscape is for hoteliers to gain a better understanding of their customers, and to apply that knowledge in a way that’s mindful of the distribution channels that deliver them.
  • Consider also the slew of limitations OTAs impose on their partner hotels regarding details such as the cutoff point at which unsold inventory is restored to the property for its own sales efforts. And their very presence irks a lot of hoteliers, who grumble that they’ve lost control of their own assets, a reality made even more bitter because they invited the snakes into their own meadow. “In my humble opinion,” sighs Jeff Froehlich, director of Sales and Marketing at Vancouver’s Shangri-La Hotel, “Hotels created the monsters that are OTAs.”
  • Certainly OTAs are a high-cost channel, but every channel has fees, and the potential in any market is different based on those channels. An independent hotel on the beach is probably using an OTA more than a branded five-star urban hotel that has its own loyalty program.
  • The optimal channel is one that leads directly to the hotel itself. The dollars spent by guests who book through a hotel’s website are pocketed by the hotel. To that end, operators might improve the look of their websites, include better content, post quality photos and generally ensure the site is superior to the competition. Additionally, they might spend some time contemplating value-adds: including free breakfasts, complimentary room upgrades and late check-ins. Loyalty programs also serve as powerful anchors for an increasing number of hotels. When someone buys a room through an OTA, he doesn’t enjoy the benefit of added points to his standings with the property.
  • Online travel agents are evil, Froehlich says, but necessary. “There’s no point trying to put the monster back in the box.” And no one is disputing OTAs’ right to real estate in the hotel universe. The notion that OTAs have grown too big for their britches notwithstanding, says Le Saint Sulpice’s Di Re, doesn’t mean hoteliers are talking divorce. “We have no choice,” he shrugs, conceding the fact the online agents have massive marketing power. “You’re damned if you do, damned if you don’t.”
24More

E-Marketing: Definition, Tips, and Best Practices | Cleverism - 0 views

  • E-marketing is the mix of modern communication technology and traditional principles that marketers usually apply.
  • electronic media, more known as the internet (
  • used by your company via direct emails, blogs, SMS or text messaging, web pages, videos, banners, pictures, advertisements (like pay per click, display or social media advertising)
  • ...20 more annotations...
  • e-marketing is that its impacts are quantifiable
  • ROI or return on investment can be greater than more traditional marketing strategies.
  • according to your company’s goals, product types, business capacity, target market, and other criteria related to your decision making processes.
  • Complete Accountability.
  • New Marketing Routes
  • Cost Effective Marketing.
  • ew site visitors are search engines.
  • incorporate all key phrases into the text in a natural manner, for at least 3 to 4 times.
  • three main steps
  • Appear on top in Google search results.
  • title of your web page
  • short but descriptive file names for your pictures.
  • Make Google understand your pictures.
  • Update your website and continuously offer useful and updated content
  • Always update your website and keep it fresh by having a blog, announcing sales, special offers, and new products.
  • avoid meta keywords.
  • Increased Reach and Audience.
  • contribute to discussion groups and forums
  • Keep track of your competitors
  • Although Amazon and eBay are popular, the margins they offer you are low
  •  
    This article really goes in depth about e-marketing and smart ways to go about when it comes to your business. It highlights the do's and don't in majority of each situation you may be faced and how to always manage your company on a daily. E-marketing is something that needs to be managed, looked through and updated on the daily to attract new and occurring customers.
3More

Hotels are right to be obsessed with direct bookings - 4 views

  •  
    Excellent article touching on this weeks topic of GDS.
  •  
    This article was very interesting. Hotels have implemented tricks of the trade to redirect people to book directly. For example, Marriott will not extend the Marriott Rewards to guests who book through third party sites like Expedia, Priceline, etc. The only way to receive Marriott Rewards points is to book directly. Hotels have to provide incentive for booking directly just to stay competitive.
  •  
    Good Afternoon, This article is very important in the last few months Marriott has developed many programs to get guest to book directly with them. Marriott does extend points to guest who book with OTA like Expedia but they only receive a portion of their points, if they wanna receive all their points they are recommended to book directly with Marriott. Marriott also invested heavily in a travel segment to compete with Airbnb, it called Marriott Home and Villas. check out the link below. https://homes-and-villas.marriott.com/
19More

Council Post: Cybersecurity As We Know It Is About To Change - 0 views

  • the global cybersecurity market is set to increase to $270 billion by 2026. This signals the priority boardrooms have placed on cyber risk management even as digital transformation takes place en masse.
  • COVID-19 has become the catalyst to trigger change in the ways we manage and operate technology.
  • Virtual desktops emulate a computer system so that IT can control access as such adding input/output devices as well as software and applications. This could become an important control point when remote workers are operating outside the safety of a corporate network.
  • ...15 more annotations...
  • Telecommuting Is The Only Way Of Working For Many
  • With the remote working concept taking center stage, re-evaluation of these policies is needed to address the new cyberthreats.
  • With millions of employees working from home, hackers’ focus has shifted from enterprise to remote working individuals. To handle the menace that exists in cyberspace, decentralized cybersecurity will rise where greater emphasis will be placed on data sources such as actual remote employees themselves.
  • User access controls have largely revolved around single or two-factor authentication. These methods rely on “something you know (username)” and “something you have (password).”
  • This means identity protection will be a top priority, and the best defense should involve building authentication systems that focus on “who you are.” This would require advanced biometric solutions such as fingerprint/thumbprint/handprint, retina, iris, voice and other facial recognition technologies.
  • The current state of privacy regulations is designed around the enterprise network and building the proverbial wall to keep sensitive data out of prying eyes.
  • With swift digitalization, security controls will shift to data sources, similar to the trend witnessed in IoT.
  • From a risk management perspective, global privacy policies will need to encapsulate standard operating procedures regarding BYOD, GDPR compliance and state privacy laws.
  • The shift to cloud services offers employees, customers, suppliers and everyone else across the ecosystem a seamless and frictionless way to access data and applications. Remote access by various users would compound security challenges and present many new potential attack vectors. In the post-pandemic world, IT resources could shift toward data, particularly keeping data secure across cloud platforms.
  • This will facilitate cybersecurity teams to apply varied access controls and demarcate data storage to minimize the risk of cyber intrusion and data breach.
  • Innovative technologies such as ML/AI and AR/VR will see greater adoption. As we have already witnessed, video conferencing applications will continue to rise as non-contact interactions surge.
  • Sectors such as retail, hospitality and manufacturing will layer their adoption of robotics with added AR/VR capabilities.
  • Cybersecurity teams that are saddled with an events-based approach will be overly burdened with triages when a cyber breach occurs. By embracing an intelligence-driven approach, businesses can digitalize confidently with external threat intelligence as the guiding beacon.
  • Social engineering techniques to trick untrained and unsuspecting employees, third parties and contractors into releasing confidential information or letting an intruder into a corporate network will also intensify accordingly.
  • Cybersecurity awareness training for people across the entire supply chain and ecosystem will prevail.
  •  
    By 2026, the investment in cybersecurity will increase to $270 billion globally. After the COVID-19 pandemic companies will need to reevaluate their cybersecurity systems to adapt to telecommuting as many companies will have some of their employees working from home. Biometric security such as a fingerprint or iris scan will become more common as the typical password will no longer be as secure as it once was.
1 - 20 of 27 Next ›
Showing 20 items per page