Skip to main content

Home/ Hospitality Technology/ Group items matching "ceo" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
shanegmark

Princeton Professors Launch AI COVID Screening Tool | Hotel Business - 1 views

  • The CovidDeep app is 90%-plus accurate in predicting whether a person is virus-free or virus-positive, and is twice as effective as current triage tools, such as temperature checks and questionnaires, according to the developers.
  • “CovidDeep has been developed as a rapid screening tool to help businesses such as hospitality venues maintain a COVID-19 safe environment,” said Dr. Adel Laoui, CEO/founder, NeuTigers. “Currently, venues rely on screening tools such as temperature checks, which are only used to detect symptomatic cases and are less than 50% accurate in detecting whether a person has COVID-19.
  • Proven rigorous clinical studies show it to be 90% accurate in detecting if a person is SARS-CoV-2 virus positive, even if they have no symptoms (asymptomatic). It is able to do this at scale, in real-time and cost-effectively.”
  •  
    New app uses AI and readily available body sensors to detect, with 90% accuracy claim the developers, whether a person is COVID-19 positive/negative. This is done within 2 minutes and compared with current temperature only checks done by many locations, which are only 50% accurate and don't capture asymptomatic persons, is a potential game changer for organizations. All staff could potentially be tested every day before their shift starts.
  •  
    I think this is a great tool for all businesses especially the hospitality industry. The fact that it is adaptable to work with many health products already owned by consumers the cost to the business is low. I also like the high percentage rate of accuracy and what little time it takes to gather this data.
jorgeegutivav

Meeting the Threat in 2019: Cybersecurity for the Hospitality Sector | Modern Restaurant Management | The Business of Eating & Restaurant Management News - 0 views

  • With a reputation as less well guarded than similar institutions, hospitality companies are a popular target for cyberattacks.
  • Experts warn other hackers, like those working for a nation-state, could exploit hospitality breaches like Marriott’s to acquire details on the travel and spending habits of espionage targets, like CEOs and diplomats.
  • permeable security in the hospitality sector threatens consumer privacy, shareholder value, and national security.
  • ...15 more annotations...
  • many hospitality companies are reconsidering their cybersecurity infrastructure. However, industry specific challenges like high employee turnover continue to expose the sector.[6]Additionally, even by adopting cutting-edge cybersecurity technologies, the important question of strategic implementation remains.
  • Are newly introduced technologies simply bolstering traditional methods of cybersecurity, or are they being used for methods of cybersecurity that are new and innovative, instead of simply faster or more efficient versions of the same product?
  • Traditional cybersecurity approaches are focused on reporting about intrusions after the fact, in what is known as an “incident response.”
  • Regardless of how they gain access, once an attacker is discovered, the forensics about the attack, including basic information known as Indicators of Compromise (IOCs) like IP addresses, domain names, or malware hashes, are shared across the cybersecurity community. These IOCs are then used broadly to thwart future attacks. 
  • The problems with this approach are twofold:
  • someone has to be a victim first so that IOCs can be derived and shared with others; additionally, blocking IOCs has a very short half-life.
  • All an adversary has to do is come from a new IP address or recompile their malware so that it has a new hash value (both of which are extremely trivial) and their attacks will sail through defenses that depend on IOCs.
  • As hackers repeatedly gain access to valuable systems and data using the same methods, cybersecurity teams continue to chase after them to secure compromised systems.
  • Very little cybersecurity effort is put towards addressing the methods used by adversaries; instead, security teams are locked in a pattern of waiting for inevitable attacks, trying to minimize the damage they cause, ensuring that remediation occurs as quickly as possible, and blocking only exactly identical attacks.
  • Incident response only helps prevent attacks that exactly replicate past ones.
  • a more proactive, sophisticated approach is needed. It will need to be designed to successfully recognize adversary methodology (and all the manners in which an adversary attempts to obfuscate their methodology) before attacks occur and at a meaningful scale.
  • Instead of seeking discrete, static IoCs based solely on what has already occurred, proactive cybersecurity analysts can instead use the intelligence they have derived about adversaries’ methodologies – commonly referred to as tactics, techniques, and procedures (TTP). 
  • From these TTPs, analysts can identify the general form and components of an adversary campaign. In addition, they can determine abstract indicators like how the adversary is attempting to hide his actions. 
  •  A proactive cybersecurity tool would be able to recognize possible adversary TTPs and indicators that describe a threat (or threatening behavior) in general terms. The system would then act on any traffic which met this pattern before it reaches inside a network, as the attack occurs, and do so in a way invisible to adversaries.
  • Using this basic model, a cybersecurity tool could truly prevent common exploits before they were executed, and could even predict and protect against future, not yet seen exploits.
  •  
    In the wake of the Marriott International cyberattack, the article presents the issues with the current issues in the methodology of cybersecurity; first explaining the data of how popular they are in the hospitality industry, and what it means for the industry, before going into the process of how a cyberattack happens and the measures taken to prevent it. Traditional cybersecurity is one of an "incident response" which can only be implemented once a cyberattack occurs and can only prevent it temporarily as a hacker can do similar tasks with different IP addresses and new malware. In order to circumvent this failure of cybersecurity, the article offers a new method in which TTPs (tactics, techniques, and procedures), are used to identify certain components of a hacker and identify how they would carry out an attack, before acting on it before the attack would "reach the network".
  •  
    This article discusses one of the largest fears of most hospitality firms, and that is keeping their client's personal information private. Most large companies in this industry have become giant data centers for the personal information of millions of people. Breaches of this type of information place the lives of many people at stake. For example, Marriott International had a security breach of over half a billion of its clients which began in 2014 and was not detected until September of this year. Keeping an individual's information away from malignant forces is just plain business sense and any more attacks of this manner will severely hurt the reputation of the business experiencing it.
dyaniroberts

6 Event Tech Innovations That Will Change the Industry - 1 views

  • 6 Event Tech Innovations That Will Change the Industry
  • “Datakalab is a neuroscientific way of reading audience members’ expressions—it’s really interesting,”
  • AI Robots at Meetings
  • ...9 more annotations...
  • Doob takes 3D to a new level by applying it to people and even animals
  • cameras capture dozens of images from all angles and the data is used to create a 3D replica, which is like an action figure,
  • This is something planners could even do as a creative thank-you presentation or as CEO gifts.
  • In a meeting or event setting, the best part is seeing how attendees are truly reacting to what a presenter is saying
  • Artificial intelligence robots debuted a few years ago, and they have started debuting at tradeshows and conventions
  • “They have facial expressions and can have full conversations with you. There are endless ways they can be used at events. They are becoming so popular,
  • G-SMATT is a fully transparent LED glass that allows event producers to create a full 360-degree program that combines the physical and digital worlds to immerse guests in a brand’s message in a unique and entertaining way.
  • The technology can display digital artwork, create augmented reality and holographic visuals, and even allow guests to play interactive games. It can be a building block for everything from tradeshow booth structures to the outside of skyscrapers.
  • “Visual Comet creates incredible LED tunnels and bar [displays], for example,” Cerbelli said. “The visuals and branding possibilities are fantastic with the imagery you can bring to life.
  •  
    This article breaks down several different items that are key players in the future of event technology. In the events industry, there are so many things that can be used to impact the guest/attendee experience. The technology innovations that are headed our way and gearing us into the right direction in executing successful, interactive and insightful meetings and events.
tgood006

Google takes its next step in online travel planning - 1 views

  • Google has finished putting all the major pieces of its one-stop travel shopping together. The company calls the offering Google Travel, and it has the system in place for consumers to try out
  • Google Travel is, of course, very much a work in progress. But that’s the Google way — test, learn, iterate, solve big consumer problems, expand it around the world, and then monetize the heck out of it,” Schaal said
  •  
    Google is indeed joining the online travel business, this will allow the largest search engine to become one of the largest travel intermediaries. Why is this important? Google has been experimenting and working with the world largest hotel company. The data they exchanged with Marriott has moved Google Travel along so much. This one stop shop is something Marriott is also experimenting with.
  • ...1 more comment...
  •  
    This article was a great choice! It will be interesting to see how it plays out. If Marriott did share their data with Google, as the previous reply indicated, most likely it will be successful. Marriott has a strong, vast database of client information. Google Travel will have plenty of information to have a strong, running start.
  •  
    Great article. When I heard about this next big step that Google is making I was intrigued because I travel about 2-3 times a year and my go to site to book flights is Google flights. I always found that it was simpler to use Google Flights than to use Expedia or Orbit. Although Expedia and Orbit offered the hotels and flights in one page, I always deemed them to be too busy and more complicate to navigate. Looking at Google Travel, Google have kept it clean, direct and simpler and no pop up ads than what we are used to from the other OTA sites. It is interesting to know how relations with Google and Expedia will be after this. Although as the article states, Expedia CEO Mark Okerstrom saw this coming and he states "we have to be watchful about what they are doing" because Google have obtained a tremendous amount of data collected from marketing that Expedia does through Google.
  •  
    True, Marriott is transitioning into a one stop shop and google has started but they haven't gotten on part with the other platforms as of yet. But it won't be long before they integrate and take over especially with all the information they have.
jwilc019

Casino Gets Hacked Through Its Internet-Connected Fish Tank Thermometer - 0 views

  • Internet-connected technology, also known as the Internet of Things (IoT), is now part of daily life, with smart assistants like Siri and Alexa
  • But of much greater concern, enterprises are unable to secure each and every device on their network, giving cybercriminals hold on their network hostage with just one insecure device.
  • There's no better example than Mirai, the botnet malware that knocked the world's biggest and most popular websites offline for few hours over a year ago.
  • ...7 more annotations...
  • Nicole Eagan, the CEO of cybersecurity company Darktrace, told attendees at an event in London on Thursday how cybercriminals hacked an unnamed casino through its Internet-connected thermometer in an aquarium in the lobby of the casino.
  • he hackers exploited a vulnerability in the thermostat to get a foothold in the network. Once there, they managed to access the high-roller database of gamblers and "then pulled it back across the network, out the thermostat, and up to the cloud."
  • compelling reminder that the IoT devices are theoretically vulnerable to being hacked or compromised.
  • Manufacturers majorly focus on performance and usability of IoT devices but ignore security measures and encryption mechanisms, which is why they are routinely being hacked.
  • Therefore, people can hardly do anything to protect themselves against these kinds of threats, until IoT device manufacturers timely secure and patch every security flaws or loopholes that might be present in their devices.
  • The best way you can protect is to connect only necessary devices to the network and place them behind a firewall.
  • educate yourself about IoT products.
  •  
    I found this article fascinating. It shows that no matter how much security we think we have, there will always be someone who is smart enough to hack you. We bring Smart devices into our homes and businesses to make our lives easier, yet these devices make us vulnerable to cyberattacks. In this article it details how a hacker(s) used a Smart thermostat located inside a fish tank to access and pull sensitive data out of a casino. I'll never look at the fancy aquariums in resorts/restaurants the same.
sharline86

What the Marriott Breach Can Teach Us About Cybersecurity in the Tourism & Hospitality Industry - 0 views

  • Marriott breach that compromised the records of up to 500 million customers. The data breach occurred through the IT company, a third party, that managed the Starwood reservation database.
  • Marriott took too long to disclose this breach.  Even though the breach was found in September, disclosure did not occur until nearly three months later — and ultimately, the company failed to protect valuable customer information. The company is already the subject of class action lawsuits that could have a severe impact on the organization.
  • Over the last 3+ years, the Tourism & Hospitality sector has been very average (if even just a bit below) when it comes to cybersecurity performance as compared to other industries.
  • ...5 more annotations...
  • Since 2016, nearly 5% of the tourism & hospitality entities that BitSight tracks (out of a total of almost 2,000) have experienced a publicly disclosed data breach. This is the 4th highest percentage of breach out of the 23 key sectors BitSight monitors, trailing only healthcare, education, and government.
  • For all companies, tourism & hospitality has the 2nd highest percentage of companies with an Open Port grade of D or lower (Education is 1st).
  • For example, Fortune 1000 tourism & hospitality companies are performing poorly compared to the sector as a whole when it comes to reducing unnecessary Internet exposures (“Open Ports”).
  • Though it is often assumed that larger organizations perform better in cybersecurity, the data on Fortune 1000 companies in this industry suggests otherwis
  • Ultimately, cyber incidents like the Marriott breach confirm that companies in this industry need to be much more about proactively mitigating the risk posed by their supply chain given the sensitive consumer information they contain in their databases.
  •  
    Bitsight examines the 2018 Marriott reservation management database breach. Using the breach as an example, this article shows how poorly the hospitality and tourism industry performs in cybersecurity versus other sectors.
jalipman

Gale Academic OneFile - Document - The anti-Venmo? Banks' p-to-p payment product eschews social 'sharing' - 0 views

  • Talie Baker, an analyst at Aite Group, said that she does not think users are demanding a social network for P-to-P payments. "Most users are interested in security and ubiquity," she said in an email, referring to the overall size and scope of the payment network.
  • But over time, Zelle's partner banks hope to support a wide range of business-to-business and business-to-consumer payments that seem more likely to generate revenue. Participating banks are also hoping that the P-to-P service will result in more satisfied retail customers, who are less likely to leave for another bank.
    • jalipman
       
      During the COVID19 pandemic this is especially true. A restaurant that can use venmo can create and literally contactless pickup of food as well as retailers can do this as well.
  • "If you owe money, you definitely want to show people that you paid, that you're not a deadbeat," said Crone, the CEO of Crone Consulting LLC in San Carlos, Calif.
    • jalipman
       
      Venmo does leverage social pressures to pay which also can limit its market when "charging people on venmo"
  • ...10 more annotations...
  • oreover, as Venmo moves into in-store payments, its use of social media may offer a way for PayPal to monetize the app's growing popularity, Crone said. After all, when a social media user endorses a particular retailer, that thumbs-up is valuable to the merchant. So the merchant may be willing to pony up for the positive buzz.
  • So as we're thinking about the use cases for Zelle, sharing the bar tab for last weekend certainly is one of those. But also other use cases that wouldn't lend themselves to some of the comical social interaction that you see," she added.
  • Zelle's architects considered, but ultimately decided against, mimicking Venmo's marriage of payments and social media, according to Alexander.
    • jalipman
       
      Zelle has placed there focus on security rather than the social aspect in order to reach an older market. It seems as if in the long run Zelle will be able to retain its market better when the social aspect of money sharing becomes an issue. (which in my opinion is almost inevitable)
  • t's one reason why the person-to-person payment app Venmo -- which encourages users to share spending habits with friends -- is so popular with the 18-to-34-year-old crowd.
    • jalipman
       
      Venmo came in ahead of the curve in the digital banking market. Mainly targeting a younger demographic it has taken off. But this ahead of the curve mentality has allowed banks to create their own digital banking apps engineered towards the older markets.
  • Transaction volume for Venmo, which is owned by PayPal Holdings, Inc., has grown by at least 130% in each of the last four quarters.
    • jalipman
       
      Venmo being the mainstream digital payment app allows it to continue to dominate. Additionally social pressures to use the app drive the market even further.
  • ts prospects also hinge on whether the big banks have made the right assessment about the willingness of middle-aged folks to mix payments data with their social networks.
    • jalipman
       
      A continual problem with technology advancements is security. In addition to this older people are less willing to use technology and mixing those two together can create an environment where older people are not willing to make the change even if it is more convenient.
  • The successor to a lackluster venture called clearXchange, Zelle is courting adults ages 18 to 54 who already rely heavily on their mobile phones. All told, 103 million U.S. consumers fall into that category. "We would say we're moving P-to-P from millennials to mainstream," said said Lou Anne Alexander, group president of payments at Early Warning Services, the bank-owned company that is developing the system
    • jalipman
       
      Zelle targets a larger demographic allowing it to target possible whole families which eventually would lead to it being the mainstream app overtaking Venmo.
  • But in rebranding and reintroducing a P-to-P payments service, the nation's biggest banks are targeting a broader demographic and betting that people who came of age in the 1980s and 1990s want to be more private about how they spend their money.
  • At the same time, Alexander pointed out that younger adults who have been early adopters of the technology are likely to shape the habits of their parents and other older consumers. "So absolutely we are not ignoring the millennials and their influence," she said.
    • jalipman
       
      This has been mimicked for many things in new technology like smart phones. As well as many social media websites. The younger generation influence drives the market.
  • t's one reason why the person-to-person payment app Venmo -- which encourages users to share spending habits with friends -- is so popular with the 18-to-34-year-old crowd.
Rochelle Perez

Barack Obama, Joe Biden, Elon Musk, Apple, and others hacked in unprecedented Twitter attack - The Verge - 0 views

  • The Twitter accounts of major companies and individuals have been compromised in one of the most widespread and confounding hacks the platform has ever seen, all in service of promoting a bitcoin scam that appears to be earning its creator quite a bit of money.
  • Shortly after the initial wave of tweets from Gates and Musk’s accounts, the accounts of Apple, Uber, former President Barack Obama, Amazon CEO Jeff Bezos, Democratic presidential candidate Joe Biden, hip-hop mogul Kanye West, and former New York City mayor and billionaire Mike Bloomberg, among others, were also compromised and began promoting the scam.
  • It’s unclear how widespread the operation is, but it appears to be affecting numerous major companies and extremely high-profile individuals. That suggests someone, or a group, has either found a severe security loophole in Twitter’s login process or third-party app or that the perpetrator has somehow gained access to a Twitter employee’s admin privileges.
jordanfernandez

A Brief History of Air Travel Distribution | Business Travel News - 1 views

  • The story goes that a chance meeting on an American Airlines flight between an IBM salesperson and then-American Airlines CEO C.R. Smith resulted in a pitch for IBM to build an airline reservations solution based on learnings from SAGE technology.
  • By the early 1970s, all the major carriers experimented with bringing the CRS to travel agencies.
  • 1990s: Global Distribution Systems Emerge & the Internet Changes Everything 
  • ...1 more annotation...
  • GDSs offered travel agencies internet access and the software necessary to build and maintain their own websites. GDSs also targeted consumers directly through new online travel agencies: Sabre launched Travelocity in 1996, and Worldspan provided content for Microsoft's Expedia startup that same year.
tredunbar

Restaurant Tech Investment And What it Means For the Industry - 0 views

  • Investment in restaurant tech has the potential to transform how chains operate, manage staff, create value, and increase sales
  • half of restaurant operators describe their use of tech as “lagging
  • The sheer scale of options, from upgraded POS systems to automated kiosks, makes it tempting for CEOs and other chain executives to leave tech to the experts.
  • ...7 more annotations...
  • cost and the time it takes to implement new systems
  • an integrated guest experience enabled by the technology and ultimately powered by something else: operational execution and capability
  • one in four guests factors in technology when deciding where to eat
  • startups will continue to unveil the capability to solve problems unique to the restaurant industry
  • chains that best harness those capabilities will create significant value and differentiate themselves, while others will increasingly find themselves at a disadvantage
  • the best indicator of success is the commitment of company leadership
  • The challenge will be tying two very disparate industries — tech and food service — together
  •  
    This article details the importance that investing in new technology has on the restaurant industry. Many restaurant concepts like Panera Bread have made it their focus to drive new technology in their restaurants and have seen an incredible and continuous ROI. The article cedes that those who take a "wait-and-see" approach will find themselves playing catch up. Attributing to this is the fact that technology is generally considered old by the time it has worked out any potential issues.
anaslip

Meeting the Threat in 2019: Cybersecurity for the Hospitality Sector | Hospitality Technology - 0 views

  • Meeting the Threat in 2019: Cybersecurity for the Hospitality Sector
  • Marriott International revealed that a massive cyberattack compromised personal information for up to half a billion individual guests of its properties.[1] The data breach ranks as the second largest known theft of sensitive personal records to date.
  • This marks the second major cybersecurity failure for Starwood, the Marriott division affected. Before being acquired by Marriott in 2016, the company’s cash register system was penetrated by malware looking to steal credit card information. [3] Other major organizations in the hospitality industry, including Hilton and Hyatt, have reported similar attacks. In 2017, for example, Holiday Inn parent company InterContinental Hotels discovered a breach lasting three months and affecting 1,200 properties. With a reputation as less well guarded than similar institutions, hospitality companies are a popular target for cyberattacks.
  • ...5 more annotations...
  • Experts warn other hackers, like those working for a nation-state, could exploit hospitality breaches like Marriott’s to acquire details on the travel and spending habits of espionage targets, like CEOs and diplomats.
  • However, industry specific challenges like high employee turnover continue to expose the sector.[6] Additionally, even by adopting cutting-edge cybersecurity technologies, the important question of strategic implementation remains.
  • Traditional cybersecurity approaches are focused on reporting about intrusions after the fact, in what is known as an “incident response.” What this means is that an adversary—commonly referred to as a “hacker”—finds some way to gain access to a target and compromises it. The target can be accessed through vulnerabilities in web frameworks, internet browsers, or internet infrastructure such as routers and modems. Regardless of how they gain access, once an attacker is discovered, the forensics about the attack, including basic information known as Indicators of Compromise (IOCs) like IP addresses, domain names, or malware hashes, are shared across the cybersecurity community. These IOCs are then used broadly to thwart future attacks.
  • Rather than rely solely on the incident response and recovery methods that have been used for many years, a more proactive, sophisticated approach is needed. It will need to be designed to successfully recognize adversary methodology (and all the manners in which an adversary attempts to obfuscate their methodology) before attacks occur and at a meaningful scale. This kind of approach, when paired with incident response tactics, could provide true security to vulnerable, critical networks.
  • A TTP-based cybersecurity tool would work in concert with existing incident response, internally-focused cybersecurity efforts, adding a layer of prevention over the top of this vital but flawed process.
  •  
    In today's world no business entity is impervious to cyber-attacks. Marriot, Hilton and InterContential Hotel Groups were all recently affected by such acts. The traditional cyber-attack method which the hospitality industry employs is oftentimes simply a reaction to the attack- "incident responses". Instead, the industry needs to shift its focus and allocate resources to aid prevention of future of attacks. This new focus was be surrounding tactics, techniques and procedures (TTP) - the ability to identify adversary and implement the necessary processes to hinder attacks.
  •  
    This article tells us about the importance of having a good cybersecurity. There are some big hospitality companies like Marriott and Hilton which have revealed that many cyberattackes compromised personal information for many guests and that cybersecurity has to be improved.
shannaton

Ecommerce Data Breaches: Real Costs of Security Mismanagement - 1 views

  • In 2013, retail giant Target had more than 110 million of its customers’ credit card and con
  • act information compromised. This breach led to the resignation of its chief executive officer (CEO) and chief information officer the following year.
  • Hackers steal personally identifiable information, like names, addresses, phone numbers, and Social Security numbers to commit identity theft.Attack groups also steal less common information, such as customers’ favorite sports teams, pet names, dream vacation spots, and places of birth to gain access to financial accounts.
  •  
    There has and continues to be constant breaches where hackers tend to use sophisticated techniques to to exploit personal data. With so much at stake ecommerce businesses must heed the warning and take proactive action to secure their data.
mmilian

What Have Hotels Done on Cybersecurity Since the Marriott Hack? - Skift - 0 views

  • Faced with the possibility of such intrusions, hotels are now turning to outside companies to protect their customers’ data
  • Hilton in 2017 had to pay $700,000 to New York and Vermont to resolve two data breaches that resulted in more than 363,000 credit card numbers being compromised.
  • California law that is intended to protect consumers from having their data sold without their consent or knowledge. The law was passed in 2018 after Cambridge Analytica got access to private information from Facebook. The California Consumer Privacy Act goes into effect Jan. 1.
  • ...3 more annotations...
  • “Companies are still struggling somewhat in finding a budget for this effort,” she said. “It’s not something that many businesses want to spend money on. Compliance is pretty thankless.”
  • Hyatt Hotels earlier this year launched a “public bug bounty” program with cybersecurity company HackerOne that allows ethical hackers to test its websites and mobile apps for vulnerabilities.
  • Joe Saracino, CEO of Cino, said that the hotel industry is starting to be more proactive to prevent more breaches.
  •  
    This article talks about Marriott's data breach. It talks about what other companies that have also been affected are doing. California has passed an act that protects guest information. The new law is a bit challenging for smaller businesses that dont typically have any IT onsite.
irinadolgopolova

Why It's Crucial to Use Accounting Software Built for Restaurants | QSR magazine - 0 views

  • “Every business uses an accounting system of some sort, and every dollar should end up there,” says Tony Smith, CEO of Restaurant365.
  • it can be difficult for multi-unit operators using a generic accounting system to see if a certain vendor is billing above the contracted price or pinpoint specific ingredients that might be leaking money due to someone over-portioning a recipe
  • a true all-in-one accounting system is more useful for restaurants because it monitors inventory, pays vendors, reconciles bank statements, tracks fixed assets, forecasts scheduling, and produces financial statements.
  • ...2 more annotations...
  • According to Smith, most financial accounting systems focus on monthly or fiscal periods which provide a comprehensive breakdown only at the end of a particular cycle. But in restaurants, where the week is so important and sales for a month which has five Saturdays can be drastically different from a month that only has four Saturdays, it’s much more important to compare data on a weekly basis by using an integrated, restaurant-specific software.
  • By adding technology that provides better visibility and guidance, operators can greatly increase efficiency and tracking in their restaurants
  •  
    The article discusses how accounting systems specially designed for restaurants can better perform activities like monitor inventory, pay vendors, record transactions, do forecasting, and generate statements by integrating all this data in real time for management to use in their decision making. Using generic software that does not fully integrate all the information available can result in a less efficient operation, where employees spend more time performing their tasks, irregularities are missed, and important information is not analyzed. For example, when compiling information for decision making, most systems focus on a monthly or yearly basis for their data breakdown, while accounting software for restaurants should be able to do it on a weekly basis to adapt to thigh margins and nature of the business.
  •  
    The author talks about the importance of having a specific to restaurants accounting system. They also point out the importance of having a system that can send alerts in cases of suspicious activity or expenses not lining up with the inventory. They also say that it is important to have the ability to review reports on a day-to-day or weekly basis.
tcale003

Party, event planners lose business over coronavirus pandemic - 0 views

  • Natasha Miller expected her San Francisco event planning company to organize more than 600 events this year, basking in the glory of previous corporate parties planned for corporations such as Google and Yelp.
  • As more cases of coronavirus are confirmed globally, Entire Productions feels the crimp caused by the outbreak as her clients are “pulling the plug” on contracts.
  • four to six more weeks of cancellations.
  • ...11 more annotations...
  • organizers are canceling or postponing events throughout the country because of the outbreak of COVID-19.
  • which has 10 full-time employees, suffered a loss of more than $15,000 in the past month alone.
  • Smaller-scale event planners also feel a high level of uncertainty.
  • “None of this is going to allow us to make up for the lost revenue and growth,” she said. 
  • “My prediction is that my business will make 50% less of what it expected to do, if not less.”
  • 'No Income at all for this month'
  • The event planning business generates $325 billion of direct spending in the USA and helps support more than 5.9 million jobs with $249 billion of labor income, according to an Oxford Economics and Events Industry Council study in 2018. 
    • tcale003
       
      An event company in San Francisco was planning over 600 events this year. As the Covid-19 pandemic has spread globally, many clients have canceled or postponed their events. Organizers are predicting that their businesses will make 50% less than what is expected if not less.
  • organizers are canceling or postponing events throughout the country because of the outbreak of COVID-19.
  • “My prediction is that my business will make 50% less of what it expected to do, if not less.”
  • which has 10 full-time employees, suffered a loss of more than $15,000 in the past month alone.
  •  
    With Covid-19 crippling businesses everywhere, event planning companies are no exception. With gatherings more than 10 people, being postponed or cancelled, most events and concerts have been cancelled. With contracts, deposits paid for, and purchased tickets, event planners are struggling to stay afloat.
obrediajones

Sabre Partnership With Google  |  Press Releases  |  Google Cloud - 0 views

  • Travel industry leader chooses Google Cloud as its preferred cloud provider to accelerate its digital transformation
  • Sunnyvale, CA, January 21, 2020 — Google Cloud today announced it has joined forces with Sabre Corporation [NASDAQ: SABR]— a leading software and technology provider that powers the global travel industry—to help digitally transform the traveler’s experience and co-create the future of travel. 
  • The 10-year-strategic partnership between Google and Sabre will enable the travel provider to improve operational agility while developing new services and creating a new marketplace for its airline,  hospitality and travel agency customers. 
  • ...7 more annotations...
  • As part of the agreement, engineers and business leaders at both companies will work side-by-side on three main initiatives:
  • Improving Sabre’s technology capability
  • Using Google Cloud tools to enhance and optimize travel:
  • Driving a broader innovation framework:
  • Thomas Kurian CEO, Google Cloud. “We believe our partnership will deliver more personalized experiences for travelers, saving time and providing greater convenience that will ultimately raise the standard for the travel industry overall.”
  • Google Cloud provides organizations with leading infrastructure, platform capabilities and industry solutions, along with expertise, to reinvent their
  • business with data-powered innovation on modern computing infrastructure.
  •  
    Article discusses the newly formed partnership between Google Cloud and Sabre. How this merger seeks to transform the travel landscape by improving operational agility and the offering of new services. Also outlines the partnerships three main initiatives: improving Sabre's technology capability, using Google Cloud tools to optimize travel. and advance the travel ecosystem.
ghoafat

The Albion Hotel Miami Beach Leaves PBX Behind for Cloud-Based Virtual Communications, Business Analytics | Hospitality Technology - 1 views

  • Despite the wide variety of excellent features and services the hotel was able to offer guests on property, The Albion Hotel Miami Beach suspected it was losing some telephone reservation business due to the poor quality of its phone service.
  • Staff members at The Albion Hotel Miami Beach worked daily with a 15-year-old analog PBX that was both inflexible and expensive to support.
  • In a fortunate turn of events, Ray Pasquale, CEO of Unified Office, became a regular guest at the hotel.
  • ...8 more annotations...
  • e never thought that a business communications system could help improve our overall operations, but this one did,”
  • The hotel implemented Unified Office’s Total Connect Now℠ (TCN℠), a managed business communications service that integrates voice and video communications, messaging, service-level monitoring, business continuity, and business analytics tools into a seamless, high quality, and reliable communications service.
  • The service also provides hotel staff with real-time performance analytics and the latest in work-flow choreography as well as automated notifications for reservations and scheduling.
  • This flexibility means a human is always available to speak with new and returning customers. Hotel staff can also easily manage and configure every aspect of the service remotely via Unified Office’s TCN℠ Operational Management Suite™ (TCNOMS™) web-enabled portal from any device.
  • change the messages played to customers while they are on hold, and they can change their own voicemail and text messages themselves whenever they want.
  • nified Office’s call choreography feature will send incoming calls from customers to a pre-defined group of people in a certain dept
  • If the first person who receives the call is unavailable, others will be able to answer the call wherever they are, on any device, even if they are out of the office.
  • Unified Office’s HQRP™ platform solves the quality and reliability problems inherent with cloud-based VoIP/UC offerings. HQRP™eliminates the need for costly dedicated phone circuits such as T1 access lines, MPLS tunnels and other expensive legacy techniques that are typically used to try to create quality and reliability.
  •  
    This article is about The Albion Hotel in Miami Beach. It talks about how they were losing business due to their outdated PBX (Private Branch Exchange) phone system. It was not reliable. They switched to a cloud based system called TCN (Total Connect Now). They are now, not only saving money, but they are able to work from anywhere at any time. This shows the benefits of cloud computing!
  •  
    In the hotel world, as technology is ever evolving and change it is most times necessary to keep up with change. This hotel was at least 20 years old in the business what worked back then to five years ago even one year ago may not work today. Granted not all hotels need to be tech savvy but if that's the majority of their clientele due to their location they may want to keep up to date to ensure that they are meeting their customers needs.
davidclark33

RePower South starts South Carolina facility - Recycling Today - 0 views

  • RePower South starts South Carolina facility
  • The recycling system, provided by Eugene, Oregon-based Bulk Handling Systems (BHS), is highly automated and capable of processing more than 50 tons per hour of mixed waste to recover recyclables and produce a fuel feedstock. 
  • processing a minimum of 120,000 tons annually. Prior to this system coming online, county residents were required to opt in and pay for household recycling or use drop-off recycling sites that only accepted paper and cardboard. All other recyclables were sent to landfill.
  • ...3 more annotations...
  • The BHS FiberPure process features screen, air, optical and artificial intelligence-powered robotic sorters to automate the production of clean fiber. Plastics and metals are also separated without manual sorting. In total, the system contains seven NRT optical sorters and nine Max-AI AQCs.
  • The plant also makes use of nonrecyclable papers and plastics by producing ReEngineered Feedstock (ReEF), a clean, low-carbon renewable fuel sold to industry, cement and utility customers to replace coal in production processes. ReEF undergoes several quality control steps, including two NRT optical sorters, which remove plastic and metal contamination. The product has been designated by the Environmental Protection Agency (EPA) as a nonwaste fuel. 
  • “RePower South is showing that it is possible, today, to help communities increase recycling of the existing waste stream while also providing the flexibility to adjust to any market condition or opportunity,” says BHS CEO Steve Miller.
  •  
    This article is about a new state of the art recycling facility that opened in the Charleston area recently. Prior to this opening, residents in this county had to pay for recycling at their house or they had to bring their recycling to a facility that only recycled paper and cardboard. Everything else was sent to the landfill. This new facility requires minimal manual sorters and residents no longer have to separate. Computer technology and robotic sorters handles everything. It also makes use of no-recyclable plastics and turns them into reusable fuel. The company has one additional facility in Alabama.
jordanfernandez

Hospitality Digital Technology: Challenges, Priorities, and Buzzwords | NextGuest Blog : NextGuest Blog - 0 views

  • Today’s hospitality is being transformed into a 100% digital technology-enabled industry powered by online, mobile, cloud, IoT, AI and blockchain tools and applications. Digital technology is making its way into every aspect of the industry: hotel operations, guest services, communications, revenue management, distribution, CRM and marketing.
  • Revenue Management Technology:
  • The future of this technology is the Smart Guestroom which will be completely personalized to guest preferences and loyalty member profile. Hilton Hotels via their Connected Room and Marriott via their IoT Guestroom prototypes are already working on synching loyalty member profiles and preferences with the room experience: room temperature, lighting, bathroom accessories, streaming media preferences, beverages, bedding, and more. Recently Hilton CEO Christopher Nassetta stated: “Imagine a world where the room knows you, and you know your room.”
torte003

Smart bars - 0 views

shared by torte003 on 30 Aug 20 - No Cached
  •  
    Robo Bars seem to be a great investment when it comes to entertainment. According to James Nicolases', CEO of the easdybar system its a money boomer. Its geared toward casinos and movie theater and possible stadiums. It ev en says that its sort of like entertainment for the guest and can cost them more then an average drink which is more profit for your bar.
« First ‹ Previous 121 - 140 of 150 Next ›
Showing 20 items per page