Skip to main content

Home/ Hospitality Technology/ Group items matching "ceo" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
anonymous

Covid pandemic accelerating the shift from cash to digital payments - 0 views

  • The Covid-19 pandemic is expected to cause a drastic decline in cash usage due to the risk of contamination.
  • “Over the past six to eight months, we’ve seen the use of cash decline even further, and that’s a trend I think that we’re going to see continue,” said Jodie Kelley, CEO of Electronic Transactions Association.
  • The unprecedented surge in the demand for contactless payment has also led to outstanding performances for major companies offering cashless methods, such as Apple, Square and PayPal.
  • ...4 more annotations...
  • Despite the rise in demand for contactless payments, many states and cities in the U.S. have passed laws banning cashless stores.
  • Millennials are the ones leading the charge toward a cashless future.
  • Nearly a third of U.S. adults said they typically make no purchase using cash during a week, according to a study by Pew Research Center.
  • Those within the industry maintain that the future of contactless payments remains promising.
  •  
    The article discusses the advancement of digital payments as a direct result of the pandemic. It discusses how cash use is on a steady decline as nearly a third of US adults said they typically make no purchases using cash. Lastly, it emphasizes on how Millennials are the ones leading the charge toward a cashless future and how the impact of the pandemic has led companies like Apple, Square, and Paypal to outstanding performances in the contactless segment.
anonymous

Florida's State-Backed Insurer Seeks Rate Hike - 0 views

  • Citizens’ president and CEO, said an increasing number of private insurers are not writing new policies or are restricting the types of properties they will cover,
  • And Gilway expects Citizens will reach 700,000 policies by the end of the year. Home sales in coastal communities have surged throughout the pandemic.
  • The reality is the marketplace in Florida is shutting down
shanegmark

Princeton Professors Launch AI COVID Screening Tool | Hotel Business - 1 views

  • The CovidDeep app is 90%-plus accurate in predicting whether a person is virus-free or virus-positive, and is twice as effective as current triage tools, such as temperature checks and questionnaires, according to the developers.
  • “CovidDeep has been developed as a rapid screening tool to help businesses such as hospitality venues maintain a COVID-19 safe environment,” said Dr. Adel Laoui, CEO/founder, NeuTigers. “Currently, venues rely on screening tools such as temperature checks, which are only used to detect symptomatic cases and are less than 50% accurate in detecting whether a person has COVID-19.
  • Proven rigorous clinical studies show it to be 90% accurate in detecting if a person is SARS-CoV-2 virus positive, even if they have no symptoms (asymptomatic). It is able to do this at scale, in real-time and cost-effectively.”
  •  
    New app uses AI and readily available body sensors to detect, with 90% accuracy claim the developers, whether a person is COVID-19 positive/negative. This is done within 2 minutes and compared with current temperature only checks done by many locations, which are only 50% accurate and don't capture asymptomatic persons, is a potential game changer for organizations. All staff could potentially be tested every day before their shift starts.
  •  
    I think this is a great tool for all businesses especially the hospitality industry. The fact that it is adaptable to work with many health products already owned by consumers the cost to the business is low. I also like the high percentage rate of accuracy and what little time it takes to gather this data.
jorgeegutivav

Meeting the Threat in 2019: Cybersecurity for the Hospitality Sector | Modern Restaurant Management | The Business of Eating & Restaurant Management News - 0 views

  • With a reputation as less well guarded than similar institutions, hospitality companies are a popular target for cyberattacks.
  • Experts warn other hackers, like those working for a nation-state, could exploit hospitality breaches like Marriott’s to acquire details on the travel and spending habits of espionage targets, like CEOs and diplomats.
  • permeable security in the hospitality sector threatens consumer privacy, shareholder value, and national security.
  • ...15 more annotations...
  • many hospitality companies are reconsidering their cybersecurity infrastructure. However, industry specific challenges like high employee turnover continue to expose the sector.[6]Additionally, even by adopting cutting-edge cybersecurity technologies, the important question of strategic implementation remains.
  • Are newly introduced technologies simply bolstering traditional methods of cybersecurity, or are they being used for methods of cybersecurity that are new and innovative, instead of simply faster or more efficient versions of the same product?
  • Traditional cybersecurity approaches are focused on reporting about intrusions after the fact, in what is known as an “incident response.”
  • Regardless of how they gain access, once an attacker is discovered, the forensics about the attack, including basic information known as Indicators of Compromise (IOCs) like IP addresses, domain names, or malware hashes, are shared across the cybersecurity community. These IOCs are then used broadly to thwart future attacks. 
  • The problems with this approach are twofold:
  • someone has to be a victim first so that IOCs can be derived and shared with others; additionally, blocking IOCs has a very short half-life.
  • All an adversary has to do is come from a new IP address or recompile their malware so that it has a new hash value (both of which are extremely trivial) and their attacks will sail through defenses that depend on IOCs.
  • As hackers repeatedly gain access to valuable systems and data using the same methods, cybersecurity teams continue to chase after them to secure compromised systems.
  • Very little cybersecurity effort is put towards addressing the methods used by adversaries; instead, security teams are locked in a pattern of waiting for inevitable attacks, trying to minimize the damage they cause, ensuring that remediation occurs as quickly as possible, and blocking only exactly identical attacks.
  • Incident response only helps prevent attacks that exactly replicate past ones.
  • a more proactive, sophisticated approach is needed. It will need to be designed to successfully recognize adversary methodology (and all the manners in which an adversary attempts to obfuscate their methodology) before attacks occur and at a meaningful scale.
  • Instead of seeking discrete, static IoCs based solely on what has already occurred, proactive cybersecurity analysts can instead use the intelligence they have derived about adversaries’ methodologies – commonly referred to as tactics, techniques, and procedures (TTP). 
  • From these TTPs, analysts can identify the general form and components of an adversary campaign. In addition, they can determine abstract indicators like how the adversary is attempting to hide his actions. 
  •  A proactive cybersecurity tool would be able to recognize possible adversary TTPs and indicators that describe a threat (or threatening behavior) in general terms. The system would then act on any traffic which met this pattern before it reaches inside a network, as the attack occurs, and do so in a way invisible to adversaries.
  • Using this basic model, a cybersecurity tool could truly prevent common exploits before they were executed, and could even predict and protect against future, not yet seen exploits.
  •  
    In the wake of the Marriott International cyberattack, the article presents the issues with the current issues in the methodology of cybersecurity; first explaining the data of how popular they are in the hospitality industry, and what it means for the industry, before going into the process of how a cyberattack happens and the measures taken to prevent it. Traditional cybersecurity is one of an "incident response" which can only be implemented once a cyberattack occurs and can only prevent it temporarily as a hacker can do similar tasks with different IP addresses and new malware. In order to circumvent this failure of cybersecurity, the article offers a new method in which TTPs (tactics, techniques, and procedures), are used to identify certain components of a hacker and identify how they would carry out an attack, before acting on it before the attack would "reach the network".
  •  
    This article discusses one of the largest fears of most hospitality firms, and that is keeping their client's personal information private. Most large companies in this industry have become giant data centers for the personal information of millions of people. Breaches of this type of information place the lives of many people at stake. For example, Marriott International had a security breach of over half a billion of its clients which began in 2014 and was not detected until September of this year. Keeping an individual's information away from malignant forces is just plain business sense and any more attacks of this manner will severely hurt the reputation of the business experiencing it.
dyaniroberts

6 Event Tech Innovations That Will Change the Industry - 1 views

  • 6 Event Tech Innovations That Will Change the Industry
  • “Datakalab is a neuroscientific way of reading audience members’ expressions—it’s really interesting,”
  • AI Robots at Meetings
  • ...9 more annotations...
  • Doob takes 3D to a new level by applying it to people and even animals
  • cameras capture dozens of images from all angles and the data is used to create a 3D replica, which is like an action figure,
  • This is something planners could even do as a creative thank-you presentation or as CEO gifts.
  • In a meeting or event setting, the best part is seeing how attendees are truly reacting to what a presenter is saying
  • Artificial intelligence robots debuted a few years ago, and they have started debuting at tradeshows and conventions
  • “They have facial expressions and can have full conversations with you. There are endless ways they can be used at events. They are becoming so popular,
  • G-SMATT is a fully transparent LED glass that allows event producers to create a full 360-degree program that combines the physical and digital worlds to immerse guests in a brand’s message in a unique and entertaining way.
  • The technology can display digital artwork, create augmented reality and holographic visuals, and even allow guests to play interactive games. It can be a building block for everything from tradeshow booth structures to the outside of skyscrapers.
  • “Visual Comet creates incredible LED tunnels and bar [displays], for example,” Cerbelli said. “The visuals and branding possibilities are fantastic with the imagery you can bring to life.
  •  
    This article breaks down several different items that are key players in the future of event technology. In the events industry, there are so many things that can be used to impact the guest/attendee experience. The technology innovations that are headed our way and gearing us into the right direction in executing successful, interactive and insightful meetings and events.
tgood006

Google takes its next step in online travel planning - 1 views

  • Google has finished putting all the major pieces of its one-stop travel shopping together. The company calls the offering Google Travel, and it has the system in place for consumers to try out
  • Google Travel is, of course, very much a work in progress. But that’s the Google way — test, learn, iterate, solve big consumer problems, expand it around the world, and then monetize the heck out of it,” Schaal said
  •  
    Google is indeed joining the online travel business, this will allow the largest search engine to become one of the largest travel intermediaries. Why is this important? Google has been experimenting and working with the world largest hotel company. The data they exchanged with Marriott has moved Google Travel along so much. This one stop shop is something Marriott is also experimenting with.
  • ...1 more comment...
  •  
    This article was a great choice! It will be interesting to see how it plays out. If Marriott did share their data with Google, as the previous reply indicated, most likely it will be successful. Marriott has a strong, vast database of client information. Google Travel will have plenty of information to have a strong, running start.
  •  
    Great article. When I heard about this next big step that Google is making I was intrigued because I travel about 2-3 times a year and my go to site to book flights is Google flights. I always found that it was simpler to use Google Flights than to use Expedia or Orbit. Although Expedia and Orbit offered the hotels and flights in one page, I always deemed them to be too busy and more complicate to navigate. Looking at Google Travel, Google have kept it clean, direct and simpler and no pop up ads than what we are used to from the other OTA sites. It is interesting to know how relations with Google and Expedia will be after this. Although as the article states, Expedia CEO Mark Okerstrom saw this coming and he states "we have to be watchful about what they are doing" because Google have obtained a tremendous amount of data collected from marketing that Expedia does through Google.
  •  
    True, Marriott is transitioning into a one stop shop and google has started but they haven't gotten on part with the other platforms as of yet. But it won't be long before they integrate and take over especially with all the information they have.
jwilc019

Casino Gets Hacked Through Its Internet-Connected Fish Tank Thermometer - 0 views

  • Internet-connected technology, also known as the Internet of Things (IoT), is now part of daily life, with smart assistants like Siri and Alexa
  • But of much greater concern, enterprises are unable to secure each and every device on their network, giving cybercriminals hold on their network hostage with just one insecure device.
  • There's no better example than Mirai, the botnet malware that knocked the world's biggest and most popular websites offline for few hours over a year ago.
  • ...7 more annotations...
  • Nicole Eagan, the CEO of cybersecurity company Darktrace, told attendees at an event in London on Thursday how cybercriminals hacked an unnamed casino through its Internet-connected thermometer in an aquarium in the lobby of the casino.
  • he hackers exploited a vulnerability in the thermostat to get a foothold in the network. Once there, they managed to access the high-roller database of gamblers and "then pulled it back across the network, out the thermostat, and up to the cloud."
  • compelling reminder that the IoT devices are theoretically vulnerable to being hacked or compromised.
  • Manufacturers majorly focus on performance and usability of IoT devices but ignore security measures and encryption mechanisms, which is why they are routinely being hacked.
  • Therefore, people can hardly do anything to protect themselves against these kinds of threats, until IoT device manufacturers timely secure and patch every security flaws or loopholes that might be present in their devices.
  • The best way you can protect is to connect only necessary devices to the network and place them behind a firewall.
  • educate yourself about IoT products.
  •  
    I found this article fascinating. It shows that no matter how much security we think we have, there will always be someone who is smart enough to hack you. We bring Smart devices into our homes and businesses to make our lives easier, yet these devices make us vulnerable to cyberattacks. In this article it details how a hacker(s) used a Smart thermostat located inside a fish tank to access and pull sensitive data out of a casino. I'll never look at the fancy aquariums in resorts/restaurants the same.
sharline86

What the Marriott Breach Can Teach Us About Cybersecurity in the Tourism & Hospitality Industry - 0 views

  • Marriott breach that compromised the records of up to 500 million customers. The data breach occurred through the IT company, a third party, that managed the Starwood reservation database.
  • Marriott took too long to disclose this breach.  Even though the breach was found in September, disclosure did not occur until nearly three months later — and ultimately, the company failed to protect valuable customer information. The company is already the subject of class action lawsuits that could have a severe impact on the organization.
  • Over the last 3+ years, the Tourism & Hospitality sector has been very average (if even just a bit below) when it comes to cybersecurity performance as compared to other industries.
  • ...5 more annotations...
  • Since 2016, nearly 5% of the tourism & hospitality entities that BitSight tracks (out of a total of almost 2,000) have experienced a publicly disclosed data breach. This is the 4th highest percentage of breach out of the 23 key sectors BitSight monitors, trailing only healthcare, education, and government.
  • For all companies, tourism & hospitality has the 2nd highest percentage of companies with an Open Port grade of D or lower (Education is 1st).
  • For example, Fortune 1000 tourism & hospitality companies are performing poorly compared to the sector as a whole when it comes to reducing unnecessary Internet exposures (“Open Ports”).
  • Though it is often assumed that larger organizations perform better in cybersecurity, the data on Fortune 1000 companies in this industry suggests otherwis
  • Ultimately, cyber incidents like the Marriott breach confirm that companies in this industry need to be much more about proactively mitigating the risk posed by their supply chain given the sensitive consumer information they contain in their databases.
  •  
    Bitsight examines the 2018 Marriott reservation management database breach. Using the breach as an example, this article shows how poorly the hospitality and tourism industry performs in cybersecurity versus other sectors.
jalipman

Gale Academic OneFile - Document - The anti-Venmo? Banks' p-to-p payment product eschews social 'sharing' - 0 views

  • Talie Baker, an analyst at Aite Group, said that she does not think users are demanding a social network for P-to-P payments. "Most users are interested in security and ubiquity," she said in an email, referring to the overall size and scope of the payment network.
  • But over time, Zelle's partner banks hope to support a wide range of business-to-business and business-to-consumer payments that seem more likely to generate revenue. Participating banks are also hoping that the P-to-P service will result in more satisfied retail customers, who are less likely to leave for another bank.
    • jalipman
       
      During the COVID19 pandemic this is especially true. A restaurant that can use venmo can create and literally contactless pickup of food as well as retailers can do this as well.
  • "If you owe money, you definitely want to show people that you paid, that you're not a deadbeat," said Crone, the CEO of Crone Consulting LLC in San Carlos, Calif.
    • jalipman
       
      Venmo does leverage social pressures to pay which also can limit its market when "charging people on venmo"
  • ...10 more annotations...
  • oreover, as Venmo moves into in-store payments, its use of social media may offer a way for PayPal to monetize the app's growing popularity, Crone said. After all, when a social media user endorses a particular retailer, that thumbs-up is valuable to the merchant. So the merchant may be willing to pony up for the positive buzz.
  • So as we're thinking about the use cases for Zelle, sharing the bar tab for last weekend certainly is one of those. But also other use cases that wouldn't lend themselves to some of the comical social interaction that you see," she added.
  • Zelle's architects considered, but ultimately decided against, mimicking Venmo's marriage of payments and social media, according to Alexander.
    • jalipman
       
      Zelle has placed there focus on security rather than the social aspect in order to reach an older market. It seems as if in the long run Zelle will be able to retain its market better when the social aspect of money sharing becomes an issue. (which in my opinion is almost inevitable)
  • t's one reason why the person-to-person payment app Venmo -- which encourages users to share spending habits with friends -- is so popular with the 18-to-34-year-old crowd.
    • jalipman
       
      Venmo came in ahead of the curve in the digital banking market. Mainly targeting a younger demographic it has taken off. But this ahead of the curve mentality has allowed banks to create their own digital banking apps engineered towards the older markets.
  • Transaction volume for Venmo, which is owned by PayPal Holdings, Inc., has grown by at least 130% in each of the last four quarters.
    • jalipman
       
      Venmo being the mainstream digital payment app allows it to continue to dominate. Additionally social pressures to use the app drive the market even further.
  • ts prospects also hinge on whether the big banks have made the right assessment about the willingness of middle-aged folks to mix payments data with their social networks.
    • jalipman
       
      A continual problem with technology advancements is security. In addition to this older people are less willing to use technology and mixing those two together can create an environment where older people are not willing to make the change even if it is more convenient.
  • The successor to a lackluster venture called clearXchange, Zelle is courting adults ages 18 to 54 who already rely heavily on their mobile phones. All told, 103 million U.S. consumers fall into that category. "We would say we're moving P-to-P from millennials to mainstream," said said Lou Anne Alexander, group president of payments at Early Warning Services, the bank-owned company that is developing the system
    • jalipman
       
      Zelle targets a larger demographic allowing it to target possible whole families which eventually would lead to it being the mainstream app overtaking Venmo.
  • But in rebranding and reintroducing a P-to-P payments service, the nation's biggest banks are targeting a broader demographic and betting that people who came of age in the 1980s and 1990s want to be more private about how they spend their money.
  • At the same time, Alexander pointed out that younger adults who have been early adopters of the technology are likely to shape the habits of their parents and other older consumers. "So absolutely we are not ignoring the millennials and their influence," she said.
    • jalipman
       
      This has been mimicked for many things in new technology like smart phones. As well as many social media websites. The younger generation influence drives the market.
  • t's one reason why the person-to-person payment app Venmo -- which encourages users to share spending habits with friends -- is so popular with the 18-to-34-year-old crowd.
Rochelle Perez

Barack Obama, Joe Biden, Elon Musk, Apple, and others hacked in unprecedented Twitter attack - The Verge - 0 views

  • The Twitter accounts of major companies and individuals have been compromised in one of the most widespread and confounding hacks the platform has ever seen, all in service of promoting a bitcoin scam that appears to be earning its creator quite a bit of money.
  • Shortly after the initial wave of tweets from Gates and Musk’s accounts, the accounts of Apple, Uber, former President Barack Obama, Amazon CEO Jeff Bezos, Democratic presidential candidate Joe Biden, hip-hop mogul Kanye West, and former New York City mayor and billionaire Mike Bloomberg, among others, were also compromised and began promoting the scam.
  • It’s unclear how widespread the operation is, but it appears to be affecting numerous major companies and extremely high-profile individuals. That suggests someone, or a group, has either found a severe security loophole in Twitter’s login process or third-party app or that the perpetrator has somehow gained access to a Twitter employee’s admin privileges.
jordanfernandez

A Brief History of Air Travel Distribution | Business Travel News - 1 views

  • The story goes that a chance meeting on an American Airlines flight between an IBM salesperson and then-American Airlines CEO C.R. Smith resulted in a pitch for IBM to build an airline reservations solution based on learnings from SAGE technology.
  • By the early 1970s, all the major carriers experimented with bringing the CRS to travel agencies.
  • 1990s: Global Distribution Systems Emerge & the Internet Changes Everything 
  • ...1 more annotation...
  • GDSs offered travel agencies internet access and the software necessary to build and maintain their own websites. GDSs also targeted consumers directly through new online travel agencies: Sabre launched Travelocity in 1996, and Worldspan provided content for Microsoft's Expedia startup that same year.
tredunbar

Restaurant Tech Investment And What it Means For the Industry - 0 views

  • Investment in restaurant tech has the potential to transform how chains operate, manage staff, create value, and increase sales
  • half of restaurant operators describe their use of tech as “lagging
  • The sheer scale of options, from upgraded POS systems to automated kiosks, makes it tempting for CEOs and other chain executives to leave tech to the experts.
  • ...7 more annotations...
  • cost and the time it takes to implement new systems
  • an integrated guest experience enabled by the technology and ultimately powered by something else: operational execution and capability
  • one in four guests factors in technology when deciding where to eat
  • startups will continue to unveil the capability to solve problems unique to the restaurant industry
  • chains that best harness those capabilities will create significant value and differentiate themselves, while others will increasingly find themselves at a disadvantage
  • the best indicator of success is the commitment of company leadership
  • The challenge will be tying two very disparate industries — tech and food service — together
  •  
    This article details the importance that investing in new technology has on the restaurant industry. Many restaurant concepts like Panera Bread have made it their focus to drive new technology in their restaurants and have seen an incredible and continuous ROI. The article cedes that those who take a "wait-and-see" approach will find themselves playing catch up. Attributing to this is the fact that technology is generally considered old by the time it has worked out any potential issues.
anaslip

Meeting the Threat in 2019: Cybersecurity for the Hospitality Sector | Hospitality Technology - 0 views

  • Meeting the Threat in 2019: Cybersecurity for the Hospitality Sector
  • Marriott International revealed that a massive cyberattack compromised personal information for up to half a billion individual guests of its properties.[1] The data breach ranks as the second largest known theft of sensitive personal records to date.
  • This marks the second major cybersecurity failure for Starwood, the Marriott division affected. Before being acquired by Marriott in 2016, the company’s cash register system was penetrated by malware looking to steal credit card information. [3] Other major organizations in the hospitality industry, including Hilton and Hyatt, have reported similar attacks. In 2017, for example, Holiday Inn parent company InterContinental Hotels discovered a breach lasting three months and affecting 1,200 properties. With a reputation as less well guarded than similar institutions, hospitality companies are a popular target for cyberattacks.
  • ...5 more annotations...
  • Experts warn other hackers, like those working for a nation-state, could exploit hospitality breaches like Marriott’s to acquire details on the travel and spending habits of espionage targets, like CEOs and diplomats.
  • However, industry specific challenges like high employee turnover continue to expose the sector.[6] Additionally, even by adopting cutting-edge cybersecurity technologies, the important question of strategic implementation remains.
  • Traditional cybersecurity approaches are focused on reporting about intrusions after the fact, in what is known as an “incident response.” What this means is that an adversary—commonly referred to as a “hacker”—finds some way to gain access to a target and compromises it. The target can be accessed through vulnerabilities in web frameworks, internet browsers, or internet infrastructure such as routers and modems. Regardless of how they gain access, once an attacker is discovered, the forensics about the attack, including basic information known as Indicators of Compromise (IOCs) like IP addresses, domain names, or malware hashes, are shared across the cybersecurity community. These IOCs are then used broadly to thwart future attacks.
  • Rather than rely solely on the incident response and recovery methods that have been used for many years, a more proactive, sophisticated approach is needed. It will need to be designed to successfully recognize adversary methodology (and all the manners in which an adversary attempts to obfuscate their methodology) before attacks occur and at a meaningful scale. This kind of approach, when paired with incident response tactics, could provide true security to vulnerable, critical networks.
  • A TTP-based cybersecurity tool would work in concert with existing incident response, internally-focused cybersecurity efforts, adding a layer of prevention over the top of this vital but flawed process.
  •  
    In today's world no business entity is impervious to cyber-attacks. Marriot, Hilton and InterContential Hotel Groups were all recently affected by such acts. The traditional cyber-attack method which the hospitality industry employs is oftentimes simply a reaction to the attack- "incident responses". Instead, the industry needs to shift its focus and allocate resources to aid prevention of future of attacks. This new focus was be surrounding tactics, techniques and procedures (TTP) - the ability to identify adversary and implement the necessary processes to hinder attacks.
  •  
    This article tells us about the importance of having a good cybersecurity. There are some big hospitality companies like Marriott and Hilton which have revealed that many cyberattackes compromised personal information for many guests and that cybersecurity has to be improved.
shannaton

Ecommerce Data Breaches: Real Costs of Security Mismanagement - 1 views

  • In 2013, retail giant Target had more than 110 million of its customers’ credit card and con
  • act information compromised. This breach led to the resignation of its chief executive officer (CEO) and chief information officer the following year.
  • Hackers steal personally identifiable information, like names, addresses, phone numbers, and Social Security numbers to commit identity theft.Attack groups also steal less common information, such as customers’ favorite sports teams, pet names, dream vacation spots, and places of birth to gain access to financial accounts.
  •  
    There has and continues to be constant breaches where hackers tend to use sophisticated techniques to to exploit personal data. With so much at stake ecommerce businesses must heed the warning and take proactive action to secure their data.
marble_bird

Recognizing-events_4.0.pdf - 1 views

shared by marble_bird on 22 Jul 20 - No Cached
  • The purpose of this research is to explore and define the digital maturity of events using the Industry 4.0 model (I4.0) to create a definition for Events 4.0 (E4.0) and to place various relevant technologies on a scale of digital maturity.
  • These surveys and the thorough literature review that preceded them allowed us to map the digital technologies used in events to levels of a digital maturity model.
  • This study has responded to calls from the academic literature to provide a greater understanding of the digital maturity of events and how events engage with digital technology.
  • ...54 more annotations...
  • We found that engagement with technology at events and delegate knowledge satisfactorily coexists for and across a number of different experiential levels. However, relative to I4.0, event research and the events industry appear to be digitally immature.
  • Events are in the midst of rapid social and technological change. With a growing variety of technological means, the industry is fast-paced and increasingly delivered to a discerning consumer market while finding ways to connect with consumers through technology
  • Digital technology is the thread of the fabric of organisations (Li et al., 2018). It is an increasingly important part of how they engage with their customers.
  • Moreover, engagement with events as fans, spectators, delegates or organisers can be augmented with digital technology by improving access and sociability capabilities, refining the personalisation of events, and thereby creating enhanced experiences.
  • As we advance into what many in business and academia consider to be a fourth industrial revolution, the capacity to control and exchange data electronically has extended our ability to create, edit, maintain, transmit and retrieve information.
  • I4.0 can be described as the digitisation and automation of the manufacturing environment. It also creates digital value chains to enable the communication between products, their environment and business partners. Digital applications have impacted the tourism sector too giving rise to ‘Tourism 4.0’
  • The events industry is an ideal environment to benefit from the implementation of a widespread digitised approach with numerous organisations empowering managers and improving the overall event experience with the integration of extensive ICT practices and systems.
  • With the more widespread adoption of digitalization in event delivery and as the supply chains of all events become intertwined with technology, we can learn how the digital maturity of events in the 21st century is shaping event management and event control.
  • The team set out to answer the following research questions: RQ1. Can digital maturity in events be defined? If so, RQ2. How should the levels of digital maturity of events be classified with regard to the digital maturity of the events industry and the development of event management theory?
  • Successful events are no longer measured by simply achieving a respectable attendance, a great deal more engagement is manifest through digital technologies
  • Successful events require organisers to create something that is considered by those who attend as a valuable and memorable experience (Pizam, 2010; Tung, 2011). Creating memorable event experiences can be described as being dependent on a number of factors including creating regular attendee engagement, providing appropriate activities, relevant subject matter, topical and contemporary focus and targeted to a sizable receptive audience.
  • technological factors being one of the most important areas of demand for companies along with the implementation of I4.0. SMEs (Small to medium enterprises) are [lagging] behind in developing strategies to implement new solutions.
  • The development of digital maturity in events can be compared to smart tourism, which Gretzel et al. (2015) expressed as a logical progression from traditional activities. Smart tourism is characterised by an ability to transform large amounts of data into enhanced tourist experiences and increased destination competitiveness thanks to the interconnection of the different stakeholders through latest ICT advancements
  • As the components of I4.0 become more prevalent in the events industry, much value can be obtained from understanding how businesses are adopting new levels of digital engagement in order to engage their audiences
  • it is prudent to suggest that the survival, and future success of events can depend upon digital maturity and transformation
  • owever, dealing with digital maturity requires careful attention as Neuhofer (2016) urges caution advising that applied technology solutions have proven to have the ability to create or destruct the value of the experience.
  • I4.0 therefore acknowledges the impact of connected computers with the key constituents being cyber-physical systems, the Internet of Things, cloud computing and cognitive computing
  • highlighted that the use of communication networks globally has risen dramatically and become ubiquitous due to the rise of smartphone ownership. This has been fuelled by social media, apps and faster broadband speeds to create a networked society
  • By combining the Internet of Things data and big data (extremely large data sets that may be analysed computationally to reveal patterns, trends and associations, especially relating to human behaviour and interactions), event managers are able to create a competitive advantage.
  • As event companies develop new and innovative ways to connect, the events themselves are absorbing aspects of I4.0 at every stage of the process; pushing the boundaries of event experiences far beyond the physical world
  • They are used to promote events before, during and after delivery and are used to gather data and inform decision-making. Generating responses from an event can be achieved using a number of methods and through both qualitative and quantitative data.
  • With the advent of big data and analytics, new sources of valuable data are available to guide decision-making processes in a more informed manner. Businesses were once looking at historical data, but advances in database technology and system processes have led to near real-time data collection and analytics
  • Failure to adopt aspects of digital technology does not necessarily suggest a poor experience or the end for those businesses less digitally mature; not every event business relies on this kind of data support to survive. Instead, this research provides an opportunity to better understand where event businesses do engage and more importantly, how communication between non-digital and fully integrated individuals/businesses can be improved.
  • Digital maturity and transformation today differs from previous periods as it not only provides the change in the main business processes but also reveals the concepts of smart and connected products through service-driven business models
  • Our analysis begins with an attempt to uncover the potential challenges, on-going developments and various strategies that will provide the events industry and academics with a forward-facing approach to the growth of technology within events. By including industry professionals and academics, the research contributes to bridging the gap between practise and academia.
  • Because the research and empirical data collection includes industry perspectives, we believe this research will provide value to event managers, marketers and practitioners around the world who wish to understand more about the digital maturity of events.
  • After conducting the social media analysis (1), it became evident that the discussions appeared to be around topics that utilise digital technology rather than the technology itself. Furthermore, and probably a reflection on the value of the group, a lot of the data included questions about understanding the topics rather than providing usable information to our research.
  • We did not have detailed information about the precise characteristics of the individuals who contributed to the dataset of posts. However, to an extent, their roles listed in LinkedIn were informative. These included events consultants, social media managers, marketing professionals, EventTech managers, CEOs at tech companies and events students.
  • Although this response rate of 52 academics may be considered low, this did allow for the creation of the initial insights into the E4.0 concept and crucially it provides a starting point to better understand the levels of the developing digital maturity model.
  • The most referenced themes were social media, marketing, apps, GDPR and mobile. The top 14 themes are shown in Figure 1 below.
  • The results of the thematic analysis reveal the most pertinent events and technology topics in this group in the time period specified. The most common topics were social media and marketing. Marketing appeared alongside other topics as a verb, a noun and an adjective. This certainly influenced its prominence.
  • This statement reinforces the knowledge and general use of social media during events. Mobile and event apps were recognised as presenting opportunities to enhance events and were considered to be a permanent part of events.
  • Carefully managed and fully integrated data and digital systems including social media, apps and CRM create digital value chains to enable the communication between events, their environment, and business partners.
  • Event organisers invest heavily on social media engagement and expect a great deal in return through social media retweets, tagging and sharing of images. However, it is just as important to understand if delegates consider technology at events that important.
  • Our expert respondents were asked if they considered the events industry to be at the cutting edge of technology. Responses were largely supportive of the suggestion that it is. 64% agree, 22% neither agree nor disagree and 14% disagree.
  • Online registration/digital booking was very familiar with 65% ‘extremely familiar’ with the technology.
  • The survey also collected a selection of qualitative data as respondents were asked to if there were any specific examples of connected/digital technology considered to be essential to the delivery of an event that had not been discussed in the survey. Significantly, 23% answered no to this question.
  • With regard to the digital maturity of the events industry affecting the development of event management theory, the literature review indicates that academics are making contributions to theory and a broad understanding of digital technology exists.
  • industry appears not to be digitally mature. Also, our findings suggest that relative to I4.0 not all events are digitally mature. Therefore, the ‘digital immaturity’ of the events industry may be having some effect on event management theory
  • It became evident from the survey that many respondents suggested they were not familiar with technology that they would all have experienced.
  • The results from the survey suggest that widespread academic understanding of technology at events is extensive. Some digital technology is considered routine, while other comprehensively used technology appears to be unfamiliar to the end user.
  • The growing digital maturity levels form the foundation for E4.0 and will contribute to what Gerbert (2015) described as greater efficiencies and changing traditional relationships among suppliers, producers, and customers.
  • Therefore, satisfaction from the event comes down to providing delegates with the right communication levels they need to complete their individual objectives. This can range from the most basic social engagement to the gathering or observation of big data. Events are evidently a melting pot of experiences and goals and not all of them demand the highest levels of technology to complete.
  • Artificial intelligence has the ability to provide events with endless systems that sense, learn and decide throughout the delivery process though many gaps exist.
  • The data also indicates that there is good knowledge across all types of digital technology. This is reassuring for the development of education as the events industry embraces digitalisation
  • However, as more value is placed on the use of digital technology and events mature through greater access to technology, we see the emergence of an E4.0 era.
  • Thus, this model anticipates that events will grow in their digital maturity to level E3 and E4. Thus, digital technologies may become sufficiently embedded so that data related to one element of an event will be used to inform other elements of an event in real time
  • Online registration and wearable technologies such as delegate smart badges are superficial digital experiences and only considered as a process rather than as a fully perceived digital experience.
  • Our findings indicate that digital communications have enabled a shift in the content of events, marketing and the use of social media as a communication tool before, during and after the event.
  • On the limitations of our research, one might argue that engagement with technology, or indeed lack of it, does not provide evidence of the immaturity of digital technology in events. However, the digital maturity model that we propose is principally informed by the literature on digital technology and events.
  • This research has provided a revealing perspective on the use of digital technology in events. It has built on theory that has been previously developed in this and similar subjects of research, such as business and tourism. From this, the research can claim a number of contributions. It (i) provides an empirical investigation into how event businesses and individuals engage with digitally technology at events, and (ii) it provides a definition of E4.0 and other preceding levels that contribute to digital maturity.
  • Our research has shown that event delegates are aware of the ability to communicate in a reciprocal process with technology rather than through a linear/top down process. This in itself is evidence of E4.0. Furthermore, this research highlights how industry is continually striving to optimise the delegate/event relationship through apps and other technology. The industry’s on-going mission to create deeply flexible communication opportunities is eliminating the possibility of gaps in the communication process in order to optimise delegate engagement at events.
  • A broader discussion on potential issues such as IT & data security, skill-sets, expensive production costs and outages; these are significant problems within internet and cloud-based technology. Furthermore, the emerging topic of E4.0 itself requires both conceptual and empirical development.
  • This research has shown that there remains a great deal to discover about the use of technology at events and many opportunities exist for further research from academics and practitioners working together to provide mutual benefits for both industry and education.
  •  
    This article covers a study performed to determine the digital maturity of events. The research conducted reveals that the majority of industry professionals are aware of technology in events. The study ultimately finds that events have a low digital maturity, but high potential for advancement. The article also addresses the limitations of the study performs and agrees that additional research should be performed to determine the relevance of technology in the events industry while acknowledging that digital engagement is not necessary or conducive to every type of event.
  •  
    This article has discovered the fact that the event industry was digitally immature. It also introduced a new concept which is called E4.0 into the academic literature. The article is meaningful since it has filled a gap in the literature relating to events and digital maturity and responded to some of the calls for research. The authors were also planning to make further research on E4.0, events, and digital maturity. They have mentioned that the studies on E4.0 itself were also requiring deeper research.
mmilian

What Have Hotels Done on Cybersecurity Since the Marriott Hack? - Skift - 0 views

  • Faced with the possibility of such intrusions, hotels are now turning to outside companies to protect their customers’ data
  • Hilton in 2017 had to pay $700,000 to New York and Vermont to resolve two data breaches that resulted in more than 363,000 credit card numbers being compromised.
  • California law that is intended to protect consumers from having their data sold without their consent or knowledge. The law was passed in 2018 after Cambridge Analytica got access to private information from Facebook. The California Consumer Privacy Act goes into effect Jan. 1.
  • ...3 more annotations...
  • “Companies are still struggling somewhat in finding a budget for this effort,” she said. “It’s not something that many businesses want to spend money on. Compliance is pretty thankless.”
  • Hyatt Hotels earlier this year launched a “public bug bounty” program with cybersecurity company HackerOne that allows ethical hackers to test its websites and mobile apps for vulnerabilities.
  • Joe Saracino, CEO of Cino, said that the hotel industry is starting to be more proactive to prevent more breaches.
  •  
    This article talks about Marriott's data breach. It talks about what other companies that have also been affected are doing. California has passed an act that protects guest information. The new law is a bit challenging for smaller businesses that dont typically have any IT onsite.
irinadolgopolova

Why It's Crucial to Use Accounting Software Built for Restaurants | QSR magazine - 0 views

  • “Every business uses an accounting system of some sort, and every dollar should end up there,” says Tony Smith, CEO of Restaurant365.
  • it can be difficult for multi-unit operators using a generic accounting system to see if a certain vendor is billing above the contracted price or pinpoint specific ingredients that might be leaking money due to someone over-portioning a recipe
  • a true all-in-one accounting system is more useful for restaurants because it monitors inventory, pays vendors, reconciles bank statements, tracks fixed assets, forecasts scheduling, and produces financial statements.
  • ...2 more annotations...
  • According to Smith, most financial accounting systems focus on monthly or fiscal periods which provide a comprehensive breakdown only at the end of a particular cycle. But in restaurants, where the week is so important and sales for a month which has five Saturdays can be drastically different from a month that only has four Saturdays, it’s much more important to compare data on a weekly basis by using an integrated, restaurant-specific software.
  • By adding technology that provides better visibility and guidance, operators can greatly increase efficiency and tracking in their restaurants
  •  
    The article discusses how accounting systems specially designed for restaurants can better perform activities like monitor inventory, pay vendors, record transactions, do forecasting, and generate statements by integrating all this data in real time for management to use in their decision making. Using generic software that does not fully integrate all the information available can result in a less efficient operation, where employees spend more time performing their tasks, irregularities are missed, and important information is not analyzed. For example, when compiling information for decision making, most systems focus on a monthly or yearly basis for their data breakdown, while accounting software for restaurants should be able to do it on a weekly basis to adapt to thigh margins and nature of the business.
  •  
    The author talks about the importance of having a specific to restaurants accounting system. They also point out the importance of having a system that can send alerts in cases of suspicious activity or expenses not lining up with the inventory. They also say that it is important to have the ability to review reports on a day-to-day or weekly basis.
tcale003

Party, event planners lose business over coronavirus pandemic - 0 views

  • Natasha Miller expected her San Francisco event planning company to organize more than 600 events this year, basking in the glory of previous corporate parties planned for corporations such as Google and Yelp.
  • As more cases of coronavirus are confirmed globally, Entire Productions feels the crimp caused by the outbreak as her clients are “pulling the plug” on contracts.
  • four to six more weeks of cancellations.
  • ...11 more annotations...
  • organizers are canceling or postponing events throughout the country because of the outbreak of COVID-19.
  • which has 10 full-time employees, suffered a loss of more than $15,000 in the past month alone.
  • Smaller-scale event planners also feel a high level of uncertainty.
  • “None of this is going to allow us to make up for the lost revenue and growth,” she said. 
  • “My prediction is that my business will make 50% less of what it expected to do, if not less.”
  • 'No Income at all for this month'
  • The event planning business generates $325 billion of direct spending in the USA and helps support more than 5.9 million jobs with $249 billion of labor income, according to an Oxford Economics and Events Industry Council study in 2018. 
    • tcale003
       
      An event company in San Francisco was planning over 600 events this year. As the Covid-19 pandemic has spread globally, many clients have canceled or postponed their events. Organizers are predicting that their businesses will make 50% less than what is expected if not less.
  • organizers are canceling or postponing events throughout the country because of the outbreak of COVID-19.
  • “My prediction is that my business will make 50% less of what it expected to do, if not less.”
  • which has 10 full-time employees, suffered a loss of more than $15,000 in the past month alone.
  •  
    With Covid-19 crippling businesses everywhere, event planning companies are no exception. With gatherings more than 10 people, being postponed or cancelled, most events and concerts have been cancelled. With contracts, deposits paid for, and purchased tickets, event planners are struggling to stay afloat.
obrediajones

Sabre Partnership With Google  |  Press Releases  |  Google Cloud - 0 views

  • Travel industry leader chooses Google Cloud as its preferred cloud provider to accelerate its digital transformation
  • Sunnyvale, CA, January 21, 2020 — Google Cloud today announced it has joined forces with Sabre Corporation [NASDAQ: SABR]— a leading software and technology provider that powers the global travel industry—to help digitally transform the traveler’s experience and co-create the future of travel. 
  • The 10-year-strategic partnership between Google and Sabre will enable the travel provider to improve operational agility while developing new services and creating a new marketplace for its airline,  hospitality and travel agency customers. 
  • ...7 more annotations...
  • As part of the agreement, engineers and business leaders at both companies will work side-by-side on three main initiatives:
  • Improving Sabre’s technology capability
  • Using Google Cloud tools to enhance and optimize travel:
  • Driving a broader innovation framework:
  • Thomas Kurian CEO, Google Cloud. “We believe our partnership will deliver more personalized experiences for travelers, saving time and providing greater convenience that will ultimately raise the standard for the travel industry overall.”
  • Google Cloud provides organizations with leading infrastructure, platform capabilities and industry solutions, along with expertise, to reinvent their
  • business with data-powered innovation on modern computing infrastructure.
  •  
    Article discusses the newly formed partnership between Google Cloud and Sabre. How this merger seeks to transform the travel landscape by improving operational agility and the offering of new services. Also outlines the partnerships three main initiatives: improving Sabre's technology capability, using Google Cloud tools to optimize travel. and advance the travel ecosystem.
ghoafat

The Albion Hotel Miami Beach Leaves PBX Behind for Cloud-Based Virtual Communications, Business Analytics | Hospitality Technology - 1 views

  • Despite the wide variety of excellent features and services the hotel was able to offer guests on property, The Albion Hotel Miami Beach suspected it was losing some telephone reservation business due to the poor quality of its phone service.
  • Staff members at The Albion Hotel Miami Beach worked daily with a 15-year-old analog PBX that was both inflexible and expensive to support.
  • In a fortunate turn of events, Ray Pasquale, CEO of Unified Office, became a regular guest at the hotel.
  • ...8 more annotations...
  • e never thought that a business communications system could help improve our overall operations, but this one did,”
  • The hotel implemented Unified Office’s Total Connect Now℠ (TCN℠), a managed business communications service that integrates voice and video communications, messaging, service-level monitoring, business continuity, and business analytics tools into a seamless, high quality, and reliable communications service.
  • The service also provides hotel staff with real-time performance analytics and the latest in work-flow choreography as well as automated notifications for reservations and scheduling.
  • This flexibility means a human is always available to speak with new and returning customers. Hotel staff can also easily manage and configure every aspect of the service remotely via Unified Office’s TCN℠ Operational Management Suite™ (TCNOMS™) web-enabled portal from any device.
  • change the messages played to customers while they are on hold, and they can change their own voicemail and text messages themselves whenever they want.
  • nified Office’s call choreography feature will send incoming calls from customers to a pre-defined group of people in a certain dept
  • If the first person who receives the call is unavailable, others will be able to answer the call wherever they are, on any device, even if they are out of the office.
  • Unified Office’s HQRP™ platform solves the quality and reliability problems inherent with cloud-based VoIP/UC offerings. HQRP™eliminates the need for costly dedicated phone circuits such as T1 access lines, MPLS tunnels and other expensive legacy techniques that are typically used to try to create quality and reliability.
  •  
    This article is about The Albion Hotel in Miami Beach. It talks about how they were losing business due to their outdated PBX (Private Branch Exchange) phone system. It was not reliable. They switched to a cloud based system called TCN (Total Connect Now). They are now, not only saving money, but they are able to work from anywhere at any time. This shows the benefits of cloud computing!
  •  
    In the hotel world, as technology is ever evolving and change it is most times necessary to keep up with change. This hotel was at least 20 years old in the business what worked back then to five years ago even one year ago may not work today. Granted not all hotels need to be tech savvy but if that's the majority of their clientele due to their location they may want to keep up to date to ensure that they are meeting their customers needs.
« First ‹ Previous 121 - 140 of 153 Next ›
Showing 20 items per page