Skip to main content

Home/ Hospitality Technology/ Contents contributed and discussions participated by agrie013

Contents contributed and discussions participated by agrie013

agrie013

CaterTrax Launches AI Powered Accessibility Technology, CaterTrax Assist - 0 views

  • CaterTrax, a leading catering management software company, has announced the launch of their new assistive technology - CaterTrax Assist. The solution will offer users a fully automated artificial intelligence (AI) solution for web accessibility and ADA compliance.
  • Our collaboration with accessiBe provides the ideal solution for our clients.”
  • Once installed, CaterTrax Assist performs an initial scan of the website and activates an on-screen accessibility interface that allows users with disabilities to adjust the site to meet their needs. Every twenty-four hours, the site is rescanned and leverages machine learning technology to make continuous improvements. This new service provides a comprehensive solution for providers adapting to ADA regulations.
  • ...1 more annotation...
  • CaterTrax Inc., a business unit of Volaris Group, is an industry-leading catering management software company that was built by caterers for caterers.
  •  
    CaterTrax is a catering software that clients can add an event, order food, and set up the event the way they want. its a great system and is very intuitive. CaterTrax partnered accessiBe. acessiBe offers users a fully automated solution for web accessibility and ADA compliance. The way the CaterTrax Assist works is that it scans the website and looks at activities on the accessibility screen to adjust the website to the users needs. this shows that even event management software is trying to make the software accessible because they want to make sure that they "cater" to everyone.
agrie013

Hospitality Upgrade | Online Skimming Threatens Hospitality E-Commerce Sites - 0 views

  • Attacks against the hospitality industry to gain payment information continue. There is a growing threat to all e-commerce websites called Web-based or Online Skimming. These attacks infect e-commerce websites with malicious code, known as sniffers or JavaScript (JS) sniffers and are very difficult to detect. Once a website is infected, payment card information is “skimmed” during a transaction without the merchant or consumer being aware that the information has been compromised.
  • Today two industry cybersecurity organizations, PCI Security Standards Council (PCI SSC) and the Retail and Hospitality ISAC, joined forces to highlight this growing threat.
  • By exploiting vulnerable plugins, brute force login attempts (credential stuffing), phishing and other social engineering techniques, the hackers attempt to gain access and inject malicious code.  “These attacks are either directly into e-commerce websites or often into a third-party’s software libraries that merchants rely upon.  These service providers may not be aware of the risk they create for their customers if they are not focused on security and the potential threats targeting them
  • ...1 more annotation...
  • The ability to detect these threats before they can cause damage is significantly important. Examples of PCI DSS Requirements providing ”detection” controls include: Reviewing code in order to identify potential coding vulnerabilities (Req. 6) Use of vulnerability security assessment tools to test web applications for vulnerabilities (Req. 6) Audit logging and reviewing logs and security events for all system components to identify anomalies or suspicious activity (Req. 10) Use of file-integrity monitoring or change-detection software (Req. 11) Performing internal and external network vulnerability scans (Req. 11) Performing period penetration testing to identify security weaknesses (Req. 11) Alerting on posts to newly observed domains in proxy logs can further provide additional avenues of detection for future phishing attacks as well as the initial reconnaissance phases of an attack on a thirdparty JavaScript library. 
  •  
    This article goes in to detail that attackers have targeted information that is acquired on websites such as credit card and other personal information. This writing does tell how PCI and Retail and Hospitality ISAC joined forces to help prevent such attacks from happening on these websites. Now PCI and ISAC are the standard when it comes to protecting information. These attacks are easily undetectable by these websites because they are only skimming for the information. this article does give tips for prevention and detection. PCI is the industry standard and by them teaming with ISAC it will make these websites and your information more safe.
agrie013

Twenty Four Seven Hotels Updates Accounting to Aptech's PVNG for 23 Properties - Hotel-... - 1 views

  • Aptech Computer Systems, the industry standard for hospitality financial systems, announced Twenty Four Seven Hotels updated its Enterprise Accounting for 23 properties to the PVNG Cloud Back Office system. Twenty Four Seven Hotels is headquartered in Newport Beach, California, with a portfolio that includes Marriott, Hilton and Hyatt brands. Aptech is an IBM Premier Solution Provider as well as a Prophix Premier Business Partner offering web-enabled business intelligence, budgeting, and hotel accounting software systems that are 100% hospitality specific.
  • Twenty Four Seven Hotels upgraded all 23 properties from Profitvue® to Aptech’s PVNG hotel accounting software in late 2019
  • Twenty Four Seven Hotels’ Vice President of Finance and Accounting Samuel Grant said, “All our properties are on PVNG now and the upgrade went smoothly. My staff loves the system. PVNG is easy to use and its cloud platform enables me to manage and review financial processes from anywhere on a mobile device. This makes it a very efficient system and gives us greater latitude in our financial operation.”
  • ...2 more annotations...
  • PVNG supports one property or a large multi-brand, multi-property portfolio. PVNG uses the most current technology platform incorporating AP, AR, GL, Statistics, Financials, and a Bank Reconciliation, all with easy to use, familiar browser navigation.
  • Each of our properties is a separate entity and PVNG lets us provide separate financials for each,”
  •  
    Twenty Four Seven Hotels has moved all their properties to Aptechs PVNG software. PVNG is a cloud-based enterprise accounting software. Aptech is a software company that has 100% hospitality specific software systems. Twenty Four Seven hotels has had no issue with this software as of yet they have only been seeing the positives of the software, the staff finds it very easy to use as well as the vice president of finance for the chain. twenty four seven hotels portfolio also includes Marriott, Hilton and Hyatt brands. this could see major hotel brands switch to more cloud based technology if this chain continues to be successful with it
agrie013

Hotel Operations in The Cloud: What Are Your Options? - 0 views

  • The 1886 Crescent Hotel & Spa, and the Basin Park Hotel in Eureka Springs, Arkansas have relied on Maestro's Multi-Property Cloud PMS for more than five years. How has it worked for them? Jack Moyer, Vice President and General Manager for both properties said, "Our hotels are unique destinations. We run each as a separate independent brand on one Cloud Maestro PMS with one database.
  • One big Cloud benefit is that Maestro hosts our system so we don't have to worry about servers, backups, or system maintenance." Moyer said another Cloud benefit is that he can operate his two hotels as one business with one call center, one sales office, and one accounting office without complex infrastructure. "Managing both properties in the Cloud simplifies our entire operation. Maestro Multi-Property Cloud PMS is a powerful system with excellent support." But the Cloud will not be right for every operator.
  • "Our company provides a flexible PMS with a browser user interface option that runs on a property's on-premise network. This option simplifies infrastructure needs for an on-premise system and gives you the best of both worlds without compromising PMS features." Dehan noted that Maestro is also available as an on-premise Windows-based solution. Maestro PMS offers a sophisticated feature-equivalent browser-based cloud solution. "Maestro is Maestro, with the full complement of features and capabilities, whether a hotel is using it on-premise or in our hosted cloud."
  • ...4 more annotations...
  • The Canadian Rockies of Alberta Canada may not have the same high-speed internet reliability as other areas. "Banff Lodging Company uses Maestro's multi-property centralized on-premise single-image database system.
  • Maestro's networked single-image database lets us recognize guests at any property whether they are with a group or on vacation, and deliver personalized service when they return.
  • We are on 723 acres with six separate lodging buildings, each with its own amenities," said Dace Starkweather, General Manager of Glen Eyrie Castle & Conference Center. "Most of our guests are repeat visitors with specific requirements. We wanted a Cloud system based on the latest technology that would make it easy to provide the highest level of guest service and create the most efficient operation. We selected the Maestro Web PMS Cloud Hosted Solution."
  • "Maestro Web PMS was better for us than an on-premise system. It reduced our overall IT requirements and ensured that all data was securely managed and backed up in the Cloud by a proven system company."
  •  
    This article is a perfect example of a cloud based PMS company also offering an onsite solution for locations that might not have a reliable internet connection. This article does have testimonials from clients that use both solutions. Maestro the PMS company has a image data base so it lets them recognize returning guest to the proprieties there systems are in. to personalize the service the guest receives. One client says the cloud PMS make it easier for managing multiple properties from one central office. Maestro is a unique company by offering solutions that can meet any proprieties needs with cloud or on-premise solutions.
agrie013

How Struggling Air India Is Setting the Stage for a Major Battle Among Distribution Gia... - 0 views

  • The battle for India’s lucrative travel market among global distribution systems is not over yet — even if Travelport has won hands down with exclusive rights to distribute Air India’s domestic flights content in India.
  • For a split second, it appears that Travelport can sit pretty and command control of a vast market all on its own. Sabre announced at the start of the year that Air India had decided to withdraw from it. Amadeus had pulled out in December 2018 after Travelport’s win, awarded in October 2018 and fully implemented by January 1, 2020, which was just too much for it to swallow. So the grass was looking green for Travelport with neither Sabre nor Amadeus on the turf
  • But Amadeus announced last week that it’s back in with Air India, even if it’s only with the airline’s international flights content, not domestic, which is now fully ensconced in Travelport. And while Sabre has failed to renew its contract, which expired at the end of 2019, the company said it is still engaging with Air India on a new agreement.
  • ...3 more annotations...
  • India is far too important for technology and distribution players to walk away. And the distribution weapon that Air India wields is symptomatic of a sick airline that oscillates between cost-cutting and generating revenue as it gasps for air to stay afloat, according to industry veterans interviewed by Skift.
  • Gradually from November 2018, travel agents in India could no longer book Air India’s domestic flights, for example, Delhi to Mumbai, on Amadeus or Sabre, only on Travelport. As the deal covers only domestic, they could still book Air India’s international flights, say, Delhi to London, on any of the three competing distribution systems, while agents outside India could also continue to book Air India’s domestic and international content on all three (until December 4, 2018, when Amadeus left, that is). But as mentioned earlier, domestic is where most of the traffic is.
  • There are also concerns the move will disrupt the business. “Travel agents tend to have one preferred GDS. Imagine that an agency has trained all the staff to use one particular GDS (global distribution system), then, for this one airline you have to train staff again. So maybe you’d just book a different airline,” said a source.
  •  
    Air India is a struggling airline that is starting a battle among GDS company. since the travel market is so lucrative in India all of them are fighting to get a piece of the pie. since Air India is struggling they are taking all comers. Travelport holds the reigns when it comes domestic flights and Amadeus Holds the reigns on the international flights. This fight for control of Air India has put travel agents in India in a bind. In November of 2018 travel agents could no longer book Air India's domestic flight on Amadeus or Sabre but only Travelport. But domestic flights is where most of the traffic is. this puts the travel agents in a bingd because they train with just one GDS. Sabre is trying to get Air India's bussiness again by offering cost savings over the other two GDS giants.
agrie013

Cloud Storage Security: How Secure is Your Data in The Cloud? - 0 views

  • Hybrid Cloud: Many companies choose to keep high-volume files on the public cloud and sensitive data on a private cloud. This hybrid approach strikes a balance between affordability and customization.
  • Intrusion Detection: Online secure storage can serve many users at the same time. Successful cloud security systems rely on identifying when someone tries to break into the system. Multiple levels of detection ensure cloud vendors can even stop intruders who break past the network’s initial defenses.
  • Internal Firewalls: Not all accounts should have complete access to data stored in the cloud. Limiting secure cloud access through internal firewalls boosts security. This ensures that even a compromised account cannot gain full access.
  • ...5 more annotations...
  • Encryption: Encryption keeps data safe from unauthorized users. If an attacker steals an encrypted file, access is denied without finding a secret key. The data is worthless to anyone who does not have the key.
  • Authentication: Weak passwords are the most common enterprise security vulnerability. Many employees write their passwords down on paper. This defeats the purpose. Multi-factor authentication can solve this problem.
  • Breach Drills: Simulating data breaches can help employees identify and prevent phishing attacks. Users can also improve response times when real breaches occur. This establishes protocols for handling suspicious activity and gives feedback to users.Measurement: The results of data breach drills must inform future performance. Practice only makes perfect if analysts measure the results and find ways to improve upon them. Quantify the results of simulation drills and employee training to maximize the security of cloud storage.
  • Is the Cloud Secure and Private?Professional cloud storage comes with state-of-the-art security. Users must follow the vendor’s security guidelines. Negligent use can compromise even the best protection.
  • Redundancy makes cloud storage security platforms failure-proof. On-site data storage is far riskier. Large cloud vendors use economies of scale to guarantee user data is intact. These vendors measure hard drive failure and compensate for them through redundancy.Even without redundant files, only a small percentage of cloud vendor hard drives fail. These companies rely on storage for their entire income. These vendors take every precaution to ensure users’ data remains safe.
  •  
    This article goes into how secure is data that is stored in the cloud. There are three different types of cloud storage. one is public, two is private and three is hybrid. The article states that most companies go with hybrid because of its versatility. cloud storage does have built in security that includes intrusion detection, internal firewalls and file encryption. the article does list that there is security risk that come with cloud storage. week passwords are one of the main concerns when it comes to cloud security. Cloud companies do what's called breach drills to see if there are any weakness in the security and if there are how do they handle the situation if the system is compromised. this article does list the pros and cons of cloud services but in the end, it shows that the writer for this article is biased towards the use of cloud services.
agrie013

Everybody Hates the Key Card. Will Your Phone Replace It? - The New York Times - 0 views

  • The number of hotels in the United States that have digital keys available rose from 6 percent in 2016 to 17 percent last year, according to a survey by the American Hotel & Lodging Association
  • Digital keys are hugely popular with travelers in some areas, like Silicon Valley, but overall, only about 10 percent of all hotel guests use them, Mr. Aznar estimated.
  • Marriott International expects to expand the use of its Mobile Key technology from the 1,800 hotels that currently have it available to its Bonvoy program members to all of its 7,000 properties by the end of 2020
  • ...1 more annotation...
  • The Lisbon hotel has only 83 rooms but purchased 1,430 card keys last year, the hotel
  •  
    This article does go in to how the newest technology with using our smart phones to open our rooms in hotels. Hotels are moving to this technology to be able lessen the impact on the environmental waste with moving away from plastic keys. Hotels are suggest that mobile keys method is more secure than RFID and Magnetic strip locks
1 - 7 of 7
Showing 20 items per page