Skip to main content

Home/ Hospitality Technology/ Group items tagged whiteboard

Rss Feed Group items tagged

katya zelinskaya

Sceptre Hospitality Resources Chooses Whiteboard Labs Windsurfer Reservations Platform ... - 0 views

  • We conducted an exhaustive review of the latest CRS technology and determined that Windsurfer gave our hotels enhanced features and an easier-to-use interface for both guests and hotel revenue managers,
  • Windsurfer allows hoteliers to monitor their hotel's activity via their iPhones or iPads by downloading the Windsurfer specific apps.
  • Today, more than 600 properties rely on Sceptre to provide electronic distribution, reservations connectivity, channel management, site and search engine optimization, revenue management strategies, reservation call centers and direct booking engines.
  •  
    This article is describing a new reservation system program which is going to support Sceptre Hospitality Resources' hotels.  This system allows users to make reservation using social media. it also allows managers to control hotel activities on their iPhones and iPads.  This program is going to maximize hotel's revenues, but upgrading users after the selection is made. 
Ryan Jove

Cool Factor: Future Of Computing Looks Like 'Minority Report' - Personal-tech - Science... - 0 views

  • Cool Factor: Future Of Computing Looks Like 'Minority Report'
  • What is the future of user
  • interfaces
  • ...3 more annotations...
  • re-think how collaboration is done in the conference room and how they are designing the next generation of computing interfaces
  • . Using special software and "spatial wands", the technology works with the touch screens already in our smartphones and tablets to take sharing and moving data to a new Minority Report level.
  • For instance, Oblong's product Mezzanine lets you take photos with your smartphone and share them on TV screens in the room. Or you can use the wand to grab a shot of the whiteboard, drag it onto a screen, and use your smartphone to annotate it. No matter what device you have, you can share media with everyone else in the conference room.
  •  
    This article describes the forward motion of technology to be used in conference center.  The new technology will allow immense technology improvements in the conference centers like using your smartphone to share photos on TVs screens.  This technology is the first step in working towards integration in conventions.
imontenegro

An introduction to building management system vulnerabilities - 1 views

  •  
    In December 2018, the FBI warned that unpatched devices on networks were exposed to hackers through an open port used to communicate with control systems.
  • ...4 more comments...
  •  
    Target stores attack in 2013. Criminals gained access to Target's point-of-sale (POS) system software to obtain the credit and debit card data associated with over 110 million accounts. However, the criminals did not directly attack the POS, but instead began stealing login credentials used by Target's heating, ventilation and air conditioning vendor when they connected to the Target web applications. Through this vector, the attackers gained access to Target's Active Directory and, ultimately, the Target POS system where they could collect credit card numbers and other sensitive data.
  •  
    In another example from 2014, a hacker broke into the building control system of a five-star hotel in Shenzhen, China, to manipulate room control systems and steal customer data.
  •  
    The four key modules of a building management system include management, automation, field devices and communications. The management level includes the human-machine interface, enterprise software, workstations, servers and, sometimes, network switches. Automation is the primary control for field devices.
  •  
    Another common BMS vulnerability is ineffectively controlled remote access to systems. The Target hack demonstrated how remote access, if it is not rigidly controlled, can be used against customers.
  •  
    One last, often-overlooked vulnerability is an aging BMS. Many buildings still have legacy BMSes installed that could be subject to simple attacks, although some of the older systems are analog-based and are not as easy to hack as modern, Ethernet-based systems. Regardless, the old systems may have default passwords that can be found on the internet and that cannot be changed or patched. These old systems may also have open ports that cannot be blocked unless you install a major -- and expensive -- upgrade or retrofit.
  •  
    Building management system is an intelligent microprocessor-based controller network installed to monitor and control a building's technical systems and services. they can be directly integrated with a broad range of building services, including access control, security, power, lighting, fire systems, elevator and escalator controls, smart whiteboards, and clinical systems. Hackers are becoming more savvy to BMSes. As a resullt, businesses must spend time and resources to patch any vulnerabilities.
1 - 3 of 3
Showing 20 items per page