Skip to main content

Home/ Hospitality Technology/ Group items matching "doing" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
sbarr011

Mobile key: It's the new reality for hotels | Hotel Management - 1 views

  • ” Shedd said. “On average, guests using digital key rate a hotel seven points higher than keycard guests with 84 percent of guests likely to use digital key again. 
  • New technology always takes time to enter the mainstream and mobile key is still on the adoption curve, but reviews among users and hotel satisfaction scores prove out that mobile key is the future
  • “The global demand for digital locks has swamped the manufacturers to the extent the typical wait time to receive new locks is up to 90 days. Challenges still exist around budgets to fund upgrading locks to BLE, but the desire to do so among hotels worldwide seems to be universal.”
  • ...2 more annotations...
  • Remote check-in with mobile keys will allow guests to go straight to [their] room and improve the hotel’s operational efficiency.”
  • The mobile technology used with radio frequency ID electronic locks delivers a more personalized and interactive guest experience—from check-in and informing guests of hotel amenities to securely accessing their room, all via their mobile device,
  •  
    The article titled Mobile Key: It's the new reality for hotels by Esther Hertzfeld, discusses the various aspects of the implementation and utilization of the mobile key technology in hotels. The mobile key technology is a Bluetooth enabled lock that a user can open with their mobile devices. The popularity and demand for mobile key entry in hotels is skyrocketing. However, hotels can't implement them as fast as the guests demand and desire them. It will be easier for hotels that are being built from scratch to integrate the feature than established hotels switching over to this new technology, but I believe they will eventually. In the article it states that guests rate the hotel 7 points higher with mobile key cards. Higher reviewed hotels will bring in more guests thus increasing hotel revenue. The utilization of the mobile room key allows the guest to check in on their phone remotely. Once the guest arrives to the hotel they can go straight up to their room without having to stop at a front desk. This gives the guest a more personalized and efficient experience, which I agree with. In my opinion being able to walk into a hotel and go up immediately to my room is ideal. I have not stayed at a hotel yet that has used the mobile key feature but I imagine it is great. I think all hotels in the future will run on mobile key entry. The article states there will be a learning curve for the guests and staff initially. It will be important to educate guests who don't travel often and guests in general. It stated that some people might feel embarrassed if they don't use the mobile key correctly and need to return to the front desk. That could be very frustrating to some guests who come to their room and then have to go back downstairs to talk to the front desk if something goes wrong. It is also stated that there will be awareness and comfort challenges with the front desk staff. I believe that mobile key entry is the future of hotel technology. It will take
dstro007

Early adopters keen on keyless entry - 1 views

  • Hoteliers say using mobile keys lets hotel employees have fewer “transactional” interactions with guests.
  • Nixing those few minutes in the lobby and freeing guests of a keycard might seem like a small change to some, but many hoteliers are betting it’s an impactful one. That’s why more companies are investing in technology that allows guests to use their smartphones in lieu of keys, bypassing the traditional check-in process.
  • Both HTL Hotels and Starwood Hotels are also among early adopters of the technology.
  • ...6 more annotations...
  • Hilton Worldwide Holdings first started piloting the use of its “Digital Key” program—which allows guests to check in, choose a specific room and unlock their door all through their phone—in July and is approaching 1 million digital check-ins per month.
  • Dana Shefsky, director of digital product innovation at Hilton, said the move allows guests to have more meaningful exchanges with the hotel staff than they might during traditional check-in.
  • “Most people don’t lose their phones,”
  • while most guests still use traditional keycards, those who do use the mobile app as keys use it often and are likely to talk glowingly about it.
  • As with any new technologies, mobile keys aren’t without their own issues,
  • But despite the pain associated with any new wide-scale technology, each of the three sources said mobile key adoption has been largely painless.
  •  
    One investment that seems to be going well is the use of keyless entry at hotel properties. We already use our phones for more that just the traditional phone calls and texting, so might as well throw room access in there, as well. Hilton Worldwide has introduced this feature through their mobile app and they seem to have much success with it. They found that with this process being implemented, guests are at the front desk for less time and the conversations with front desk associates are "more conversational and less transactional". Hilton plans to expand this keyless entry feature throughout all of its brands through 2016, with more than 170,000 rooms expected to be upgraded. Of course, with it being a technology, flaws are bound to exist. The first fix that is being worked on is the ability to use the keyless system even in the event of a power outage. Also, properties are looking into how to go about extending the battery life of the technology in the doors to prevent any inconveniences for guests.
Jennifer Beatriz Hernandez

11 Ways Mobile Technology Could Change Hotel Experience - 7 views

  • It is opening a variety of delivery mechanisms for personal guest services that are affordable, efficient and easy to use.
  • Hotel Room Keys - Technologies already exist that allow guests to safely use their mobile device as a room key by sending an encrypted signal to the guest's cell phone that is unique to each user.
  • Room Service – With the use of apps, you won't be tethered to your room in order to get room service
  • ...2 more annotations...
  • Thermostats, Light Switches and more – All-in-one systems already exist, allowing guests to have central control of media, lighting, temperatures and more
  • Loss of revenue from one mobile device inspired change might lead to new and creative ways to reach the hotel's bottom line because of another change
  •  
    Great article summarizing various elements a mobile device can be used for in a hotel. Mobile devices are becoming a priority in younger generations & are often used not just for phone calls, but also text messaging, web searching & games. It's no surprise they are now being used to check in at hotels, pay bills & order room service. Cell phones provide guests a unique customer service that is inexpensive, quick & simple to use. Using mobile devices as room keys is an example that will save the hotel money in not having to purchase thousands of room keys & having to deal with replacement cards for guests. There are several benefits to utilizing mobile devices in the hospitality industry, but there are also drawbacks. Guests may choose to play games on their phone or watch movies on their phone's screens instead of paying to watch a movie on the hotel's television or attending activities offered by staff. This reduces the face-to-face customer service that many hotels are recognized for. It may take away from the hotel's superior guest service if a request does not go through the mobile device or it malfunctions when a guest is trying to enter their room. Whether or not hotel managers like it, mobile devices are becoming popular among guests & should be implemented.
  • ...1 more comment...
  •  
    Great article, and it will be interesting to see how over time, the industry evolves to adapt mobile technology on property. While it creates opportunities for hotels and guests respectively it will also create opportunities for hackers and those who have malicious intent with the sensitive types of data. As soon as hotels figure out ways to make this work, hackers will figure out ways to crack the system. I think the industry would have to work with cell phone network providers as well as hardware providers to ensure that these devices and transactions can remain secure.
  •  
    This article discusses how technology is changing the experience you have while staying at a hotel, by making it much easier for the guest. The article specifically address 11 areas in which technology is changing the whole experience. First is a mobile wallet, which will make paying the bill a breeze, by wirelessly sending credit card information directly to the hotels computer. Next, how about using your smart phone as a room key, as well as using it as the in room phone, connecting you to the front desk anytime any place. Or using it to order room service, and having it delivered to you anywhere on the property by using your phones location services. Next the article discusses virtual concierge desk, which can be scattered around the property, making it easy to make dinner reservations without having to wait in line. And the last main points that are discussed are controlling the temperature, lighting, and in room entertainment from an app on your smart phone, letting you turn off and on lights from bed, and changing the temperature before you even get back to the room. And one day when you forget your smart phones power cord and think your taking a step back in time, because you cant use any of the new technology, no worries their will be one in the room.
  •  
    Mobile technology is constantly changing the way we do everything. Smart mobile devices dictate how we live our lives and how we travel. Here is a sampling of eleven items that may be drastically different in some hotels of the near future: 1. Currency 2. Hotel Room Keys 3. In-Room Phone 4. Concierge Desk 5. Room Service 6. Front Desk Attendant 7. Printed Hotel Promotional Material 8. Alarm Clocks 9. In-Room Entertainment 10. Thermostats, Light Switches and more 11. Power Cords
yvenisem

The Advantages of Manual or Computerized Accounting | Small Business - Chron.com - 0 views

  • Such information may be analyzed to help business owners make future financial decisions, using the advantages of either manual or computerized accounting.
  • Computerized accounting has the advantage of increased efficiency and time management when compared with manual accounting.
  • Computerized accounting has the advantage of higher accuracy when compared with manual accounting
  • ...19 more annotations...
  • The potential for human error is greater when employees are manually completing accounting procedures.
  • The advantages of manual or computerized accounting systems may be equal when it comes to reliability.
  • Manual accounting can function independently of machines so that work continues when "the system" isn't working.
  • modern backup systems and increased functionality, the disadvantage of reliability in computerized accounting may be lessened.
  • the subtlety and focus of an analysis’ conjecture or hypothesis depends on the person operating the system.
  • manual accounting may have an advantage over computerized accounting systems.
  • computerized accounting systems lose their potential for sophisticated analysis.
  • analysis may be hampered or obstructed by software design.
  • Computerized systems can cost millions of dollars to purchase, implement and maintain. It may be necessary to purchase updated software with some regularity.
  • automatically updated and instantly available.
  • It can be costly to staff qualified accountants to complete manual accounting processes, but it can also be costly to staff accountants familiar with specific computerized accounting software and programming.
  • Computerized systems can produce invoices, purchase orders and other documents more quickly.
  • small business owners who are not tech-savvy may prefer to use physical records instead of software
    • yvenisem
       
      still a dangerous game to play
  • All calculations are performed manually, which eliminates the risk of duplication mistakes and corrupt data
    • yvenisem
       
      didn't consider this
  • Computerized accounting systems are significantly more complex and involve a learning curve
    • yvenisem
       
      can be daunting to learn for many people
  • Additionally, there is no risk of data loss or leaked financial information due to data breaches.
    • yvenisem
       
      good pro
  • Some may require switching to the latest computer technology, leading to higher costs
    • yvenisem
       
      might not be financially feasible for many
  • manual accounting is prone to human error
    • yvenisem
       
      #1 con in my eyes
  • computerized accounting provides companies with financial intelligence
    • yvenisem
       
      so much easier to do everything where you know what the finanical outlook will be like
  •  
    This article compares the advantages and disadvantages of having a computerized accounting system and then also completing the task by hand. When looking at different factors it is clear that it seems like an owner would run a risk going either way because where the computer would lack in areas, the human touch would prevail and then where a human touch would lack in other areas, the computer would prevail. Therefore, I would conclude that it is probably better to have a little bit of both to help make the process smooth but not over bearing on a human or even on the computer.
  •  
    This article basically goes over the pros and cons of switching over to computerized accounting systems like Quickbooks and Freshbooks. It goes over the main concerns like data breached and human error, but it also deleves a little deeper to discuss how many of the software require regular system and hardware updates in order to have the software run efficiently.
khadija2050

5 Key Steps to Managing Restaurant Theft and Fraud | QSR magazine - 0 views

  • Employee theft accounts for around 75 percent of restaurant losses
  • The National Restaurant Association estimates that employee theft accounts for around 75 percent of restaurant losses.
  • MonitorNumbers never lie. Find a way to track transactional data from your Point of Sale (POS) and Back-of-House (BOH) systems. Through ancient spreadsheet methods or with an external system that integrates data from all sources, you need to collect and monitor your data.
  • ...9 more annotations...
  • With your data, pinpoint odd situations
  • This information should be flagged because it's potentially problematic.
  • MeasureTrack the incident for prevention and reference.
  • RouteOnce you have detected a possible incident, depending upon your position, whether it’s a restaurant manager, district or regional manager, inform the appropriate management.
  • Managing fraud is a continual process, and you need the tools to record events and the data to keep track of unresolved issues.
  • The solution should automatically route possible issues to the person most capable of investigating them. As they do the investigation, the system should allow them to record the resolution they feel is best for the situation. And the system should give you an up-to-the-minute account of where all the detected issues stand.
  • Numbers never lie. Find a way to track transactional data.
  • As a restaurant operator, you must realize that your employees may be behind your recent food and beverage losses or the POS manipulation scheme you can't seem to pinpoin
  • if you have a comprehensive loss management system in place, there is a higher chance theft will be deterred and detecte
  •  
    the article highlights major keys that managers should keep an eye on in order to identify theft fraud at restaurants
lethannelson268

Meet the burger-flipping robots that may take over fast food kitchens - Los Angeles Times - 0 views

  • The product of decades of research in robotics and machine learning, Flippy represents a synthesis of motors, sensors, chips and processing power that wasn’t possible until recently
  • Costing less to employ than a minimum-wage worker, Flippy is built to slip in right alongside humans on the fast-food line.
  • Off-the-shelf robot arms have plunged in price in recent years, from more than $100,000 in 2016, when Miso Robotics first launched, to less than $10,000 today, with cheaper models coming in the near future
  • ...5 more annotations...
  • Miso can offer Flippys to fast-food restaurant owners for an estimated $2,000 per month on a subscription basis, breaking down to about $3 per hour
  • A human doing the same job costs $4,000 to $10,000 or more a month, depending on a restaurant’s hours and the local minimum wage. And robots never call in sick
  • So far, early versions of Flippy have put in time on the line at Dodger Stadium and at locations of CaliBurger
  • Jordan believes Flippy is poised to become a regular part of fast-food kitchens across the country in the next year, especially in markets with higher labor and real estate costs like California
  • Miso has raised more than $13 million in investment and is currently trying to raise an additional $30 million to fund its push into fast-food kitchens from small investors on the equity crowdfunding platform SeedInvest
  •  
    This article discusses how Miso Robotics, an innovative technological company, invented and developed robotic arms that flip burgers and make fries. This robot, Flippy, is one that is the first of its kind in the restaurant industry, and was invented to work alongside humans. However, with its reduced costs and its efficiency, it may replace humans in the kitchen in the near future, especially with the turnover rate so high in the restaurant industry. With the invention of Flippy and testing it out at LA Dodger Stadium as well as CaliBurger, a fast food company owned by Miso Robotics, Miso Robotics are utilizing the ahead of the curve approach since Flippy is the first of its kind.
teresaricks

Artificial intelligence is reshaping the hospitality industry | Strongbytes - 0 views

  • With the help of AI, businesses operating in the hospitality industry can upgrade their services, processes and improve customer experiences.
  • AI systems, more specifically chatbots, have proved to be extremely effective when it comes to direct messaging and online chat services. Chatbots are able to understand and respond to simple questions or requests almost instantaneously. And they can do this 24 hours a day, seven days a week.
  • Apart from discussing with customers, AI-driven chatbots can help hotel guests with a wide range of tasks, including ordering meals or drinks, controlling room temperature and lighting, managing evening reservations, as well as taxi booking and itinerary planning.
  • ...6 more annotations...
  • Most accommodations collect a lot of information about current or potential guests and AI systems can sort through these large amounts of data and draw important conclusions that will help businesses adjust their services and strategies.
  • Machine learning based techniques such as natural language processing and sentiment analysis can help you extract key customer data, like certain positive or negative phrases from a voice chat, an instruction to an AI-powered assistant from your hotel or a discussion in the review section of your website. This information will allow you to customize your offer or rewards program for certain guests.
  • Introducing AI-based features into websites can reduce friction and provide customers personalized experiences, while also freeing up staff who can handle more complex tasks.
  • Regarding occupancy, an AI system can help businesses by providing relevant insights into the occupancy patterns of the area they're located in. In addition, it can dynamically adjust pricing rates from day to day.
  • Furthermore, AI can parse multiple sources of information and identify if there are any upcoming events that might influence your occupancy rate or might determine the price to go up.
  • airports are benefiting from AI-powered robots too. These robotic assistants can help passengers by carrying out a series of tasks including providing information in different languages, performing check-in activities, etc
  •  
    This article discusses the various ways that AI is being integrated into the hospitality industry and the positive effects it has had in the industry.
kristenagosto21

AI in the Hospitality Industry: Pros and Cons - Hotel-Online - 0 views

  • AI can assist hospitality professionals to improve the experiences of travelers. In fact, the use cases of AI in the industry is quite impressive, and the technology seems to be well-positioned to enable people to enjoy their stay.
  • Six service delivery robots perform such duties as taking amenities to guest rooms and patrolling the buildings. According to reports, the company has saved the security team 111 manhours, as human employees could now watch live footage provided by robots instead of monitoring the facilities themselves. In addition to saving time, the robots also help with handling unexpected staff absences and high occupancy periods more effectively
  • Pro: The Ability to Enable Travelers to Research Travel Options with a Chatbot This one is also about personalization. A recent study done by Booking.com revealed that 75 percent of customers preferred self-service options to get answers for simple requests, which makes chatbots a perfect option in this case.
  • ...3 more annotations...
  • According to ChatbotGuide.org, Booking.com’s chatbot is capable of handling about 50 percent of users’ post-booking accommodation-related requests. In case it can’t provide an appropriate answer, it redirects the user to a human customer service team member.
  • Con: AI is Still Developing Even though AI has made tremendous progress in recent years, the field is pretty much in its infancy. In fact, Andrew Moore, Google’s vice president and an AI leader, has the following to say on this matter, according to CNet: “AI is currently very, very stupid… It’s not something we could press to do general-purpose reasoning involving things like analogies or creative thinking or jumping outside the box.”
  • Con: Data Privacy Issues This is one of the most pressing concerns that all businesses looking to take advantage of AI will face. Data collected by the technology during interactions with users can be potentially used for other purposes, therefore, the risk of data privacy violation is involved.
  •  
    In this article, Donald Fomby discusses the Pros and Cons in the Hospitality Industry by giving great examples of AI being used in the industry today.
ovila009

Global distribution system (GDS): Complete guide for hotels - SiteMinder - 1 views

  • More than 600,000 travel agents plug into the GDS every day on behalf of companies to book flights, hotels, car rentals and destination activities.
  • Despite the growth of third party online travel agencies (OTAs) like Booking.com and Expedia, the GDS remains the number one way to promote your hotel to the corporate travel market globally.
  • A GDS is a worldwide conduit between travel bookers and suppliers, such as hotels and other accommodation providers.
  • ...62 more annotations...
  • The history of global distribution systems dates back to the 1960s when a more sophisticated method was needed to keep track of flight schedules, availability, and prices
    • anonymous
       
      This is how GDS started back in the day in order to keep track of things however nowadays it is used for so much more.
  • Hoteliers are always looking at ways to increase their reach to attract more customers, increase revenue, and make a profit
    • anonymous
       
      Hence why GDS is so beneficial for hotel companies and other industries.
  • As soon as a reservation is made on the GDS or an online booking website, the channel manager instantly reduces inventory across all channels, including the hotel’s own website, and automatically delivers the reservation details back into the PMS or central reservation system (CRS).
    • anonymous
       
      Reservations are now made quick and easy with this system. It gives customers a pleasant experience.
  • There are several major global distribution systems that house and process the majority of data from hotels, airlines, and other distributors. These include Amadeus, Sabre, Galileo, Worldspan, Apollo, and Pegasus.
    • anonymous
       
      Here we can see some examples of GDSs.
  • The Apollo reservation system was used by United Airlines until 2012, when it switched to SHARES, a system used by its former Continental Airlines subsidiary.
  • Sabre is seen as a pioneer for online travel agencies, corporate booking tools, revenue management, and web and mobile itinerary tools, to name a few.
  • Galileo traces its roots back to 1971 when United Airlines created its first computerised central reservation system
  • created by other airline groups in an attempt to gain market share in the computer reservation system market.
  • Worldspan is a Travelport platform, and is the technology leader in web-based travel eCommerce, offering solutions for all facets of travel business online. As a leading GDS, Worldspan provides travel distribution, technologies and services for thousands of travel companies worldwide, including travel agencies, corporations, travel suppliers and travel websites.
  • Amadeus has the biggest global footprint of any of the GDSs, with a potential reach to millions of guests.
  • Abacus was founded in 1988 and became a leading provider of travel solutions and services in the Asia Pacific region.
  • Pegasus Solutions pioneered the hospitality reservations industry.
  • The best systems will connect your hotel directly to the world’s most prominent GDSs
  • Using a software provider to tap into the GDS saves a lot of money and time.
  • Essentially, the GDS can increase hotel bookings and revenue by placing hotels on more ‘supermarket shelves’ globally.
    • anonymous
       
      It gives hotels the ability to expand and increase the number of customers they get by exposing them more internationally.
  • there are still more bookings being generated through the GDS than through hotel websites.
  • The GDS is indeed a unique and direct marketing tool for your hotel.
  • booked quickly and efficiently.
  • The GDS can help hotel managers uncover new market segments to promote their products to
  • More travel agents are relying on the GDS to find the best places for their clients to stay.
  • the GDS improves search positioning and displays your brand messaging during the search and booking process
  • Hotels generate more revenue through a GDS because it places the hotel’s information, availability and rates in prominent locations where it is easy for travel agents to find.
  • you can market all of your rooms to all of your distribution channels at one time.
  • Your GDS should help you maximise your bookings and increase your revenue
  • the capability for the GDS to integrate completely with your existing PMS, online booking engine and channel manager.
  • help you make the best decisions regarding your marketing strategy and distribution plan.
  • discover and tap into the most powerful and motivated market segments.
  • trial the GDS for a short time and measure results before continuing your subscription.
  • Because cruise travellers rely heavily on travel agents for their trip arrangements, it’s highly likely any hotel bookings will also be made through this channel.
  • A GDS is a worldwide conduit between travel bookers and suppliers, such as hotels and other accommodation providers
  • Cruises tend to rely on more conventional channels like travel agents to reach and convert guests.
  • With the cruise industry currently in a state of growth, it represents a chance for hotels to get a slice of the revenue.
  • It appears travel agents are driving most of this success, with 70% of cruise bookings made via this channel.
  • Cruises do all the hard work to book their guests but often they will arrive a day or two early or depart a day or two after their cruise, booking at hotels for the extra time.
  • Most prominent is your hotel description
  • you eliminate the frustration of signing up with each individual platform, and you can connect to all of the top providers without paying the individual fees.
  • The GDS is often used to tap into the corporate travel market because it has the ability to present hotels, flights, and car rentals in one simple interface which is convenient.
  • Live rates and availability are sent from a hotel’s property management system (PMS) directly to the GDS and online booking websites via a channel manager.
  • What are the major GDS systems?
  • here are several major global distribution systems that house and process the majority of data from hotels, airlines, and other distributors. These include Amadeus, Sabre, Galileo, Worldspan, Apollo, and Pegasus.
  • There are several major global distribution systems that house and process the majority of data from hotels, airlines, and other distributors. These include Amadeus, Sabre, Galileo, Worldspan, Apollo, and Pegasus.
  • Amadeus GDS
  • Sabre GDS
  • Galileo GDS
  • Worldspan GDS
  • Apollo GDS
  • Abacus GDS
  • Pegasus GDS
  • – like the ones mentioned above – so you don’t have to worry about signing up to each one
  • individually.
  • In one fell swoop you can access all the retail and traditional travel agents you want:
  • There are a few specifications which will greatly aid successful GDS connectivity: Being centrally located Being located close to an airport Room capacity of more than 20 rooms Lodgings that are set up for corporate markets and not affected by seasons
  • Here’s a checklist to ensure you’re using the GDS to its full potential:
  • 1. Pooled inventory
  • 2. Commission-free structure
  • 3. Integration capabilities
  • 4. Comprehensive reporting
  • 5. Ability to target specific markets
  • 6. No lengthy contracts
  • 7. Simple and affordable connection
  • Essentially, the GDS can increase hotel bookings and revenue by placing hotels on more ‘supermarket shelves’ globally. This approach is particularly effective at capturing international corporate travellers. You can gain lucrative international corporate business, particularly if you’re near a major airport gateway or close to government or commercial enterprises.
    • yoevelyn
       
      This article goes into how to optimize the use of GDS for a hotel operation and the author touched on a point we have discussed in the class before: how to market your local hotel to an international audience. The author suggests that adding your property to a GDS can be a cost-effective way to bring those international business travelers, specially if your hotel is near an airport.
  • The number of bookings generated through a GDS generally outpaces that of direct bookings
  •  
    This article goes in depth into GDS. It explains the concept of the GDS is and how eaxctly it works. It also gives examples of some major GDSs. It talks about the benefits of using GDS in hotels.
  •  
    The global distribution system in the hospitality industry is beyond vital in the act of keeping the ball rolling. GDS provides live products and offers to travelers across the globe. Whats really amazing about GDS is that live availability and rates are transferred through a channel manager directly to online booking sites. This allows guests to acquire the best rates the soonest as opposed to waiting to call a hotel or resort to see what they have and at what price.
  •  
    This article shows us everything we need to know about Hotel GDS. It includes GDS in the hotel industry, GDS work way in travel, seven major GDS systems, the way to access leading GDSs with GDS software, GDS conditions of use, benefits of connecting hotel to the GDS, and how to use the GDS to capture cruise travel bookings at hotel.
fdiaz75

Hotels need to pay better attention to social media to drive revenue | Hotel Management - 0 views

  • Brands need to measure whether or not they’re accessing their target audience on social media, and whether those interactions are helping move the customer through to booking,”
  • Hotels need to pay attention to the conversations around their brands online, and they need to get involved,”
  • Social media users are using social media to figure out where they’re visiting next, what they’re going to do when they get there, and where they are going to stay,”
  • ...1 more annotation...
  • The companies that are best at tracking social media return are measuring all of their marketing efforts including organic and paid social so they can see how social media is driving traffic and influencing purchasing decisions.”
  •  
    It is crucial that hotels manage their social media presence and reputation if they plan to attract newer customers. The newer generations go to social media sites now to see what people are saying about hotels. A single bad review without a rebuttal can really make people think twice before booking. If its a negative review the hotel has to respond to show good faith to any future bookers that they are willing to respond. Same goes for positive reviews, some guests appreciate the acknowledgment. As its stated in the article its important hotel are aware of the conversation about their property. Another key to social media will be analyzing the data to make sure you are aiding guests through the booking process.
jlewinsky

Hotels: Are Your Cyber Defenses Ready for 2021? | Hospitality Technology - 0 views

  • Two of the top five biggest data breaches made public in 2020 were at hotel chains. Attackers stole personal information including names, emails and addresses from 5.2 million guests at Marriott and 10.6 million guests of MGM Resorts.
  • To ensure a swift recovery from COVID-19, the hospitality industry must shore up its cybersecurity protections — or risk more headline-making breaches in the future.
  • Risk is especially high at hotels because attackers have multiple points of entry.
  • ...14 more annotations...
  • Breaches undermine hospitality brands’ reputations and erode customer trust. Eighty-one percent of consumers will stop engaging with a brand after a breach, according to a 2019 study.
  • When it comes to cybersecurity, companies today have two options: Defend the fort or devalue the data. The former is the more traditional approach. By strengthening the digital “walls” around your data — via firewalls, intrusion detection, 24/7 monitoring and other security protections — the defend-the-fort approach works to keep attackers from accessing your systems at all.
  • However, one of the biggest vulnerabilities may be on the hotel grounds themselves.
  • hotels have multiple point of sale (POS) terminals across different locations, from the front desk to restaurants, all of which are connected to each other. If a POS device is not properly secured, attackers can use malware or other attack vectors to steal clear-text credit card numbers and other data.
  • POS attacks remain one of the most common causes of data breaches in accommodations and food services.
  • Guests may share their credit card numbers with the hotel in advance via a booking app or website, opening up the possibility of web-based attacks. Loyalty programs are another source of online vulnerability, with an estimated $1 billion a year lost to account fraud and related crimes.
  • One important and underutilized aspect of cyberdefense is employee training.
  • Make sure your employees use strong passwords and know how to spot fraud and spear phishing attacks. You may also want to limit employee access to confidential data, so if an account gets hacked, private guest information doesn’t go with it
  • You should also make sure your software is up to date with all security patches, as attackers often exploit known weaknesses in programs. Isolating POS devices from the rest of the network can also limit the damage from malware infections at that entry point.
  • it’s unlikely that even the strongest digital “walls'' will prevent all incursions. Defenses are important, but the ever-changing nature of technology means that new, hard-to-catch vulnerabilities will pop up all the time.
  • important to devalue your data, rendering it unusable to attackers who gain access to your systems. One way to do this is to implement point-to-point encryption (P2PE) by encrypting payment information from the moment it enters your network at the POS
  • Encrypted data is unintelligible to anyone who doesn’t have the right digital key. Implementing P2PE is the only way to ensure that clear-text payment data doesn’t fall into the hands of attackers targeting POS systems with malware.
  • Data that’s stored for the long term, like passport information or credit card numbers saved to a loyalty program, can also be devalued through tokenization. Data that’s tokenized gets replaced with an alphanumeric pseudonym, so the actual sensitive information isn’t stored on your servers. This method helps secure guest information beyond the initial transaction at the POS.
  • Hotels that reckon with their security vulnerabilities now will protect themselves from fines and other fallout from data breaches as business rebounds. They’ll also build deeper, more trusting relationships with customers by keeping their personal information secure. By strengthening security protections and devaluing their data, hotels can set themselves up for a brighter future. 
  •  
    This article describes the vulnerabilities in the security systems of the hotel Industry. The POS system was recognized as one of the most vulnerable areas that are more targeted by hackers. This is due to the multiple stations where the POS systems are located on the premises of the hotel. Likewise having POS systems independent of the hotels security system left the system open to hackers. Two options to defending the cyber-defense, are digital walls and employee training. Digital walls works by keeping hackers from accessing the systems. Although even with a strong firewall it is recommended to implement point-to-point encryption (P2PE), this encrypts payment information of guest. the other is tokenization. This uses alphanumeric pseudonym to protect data stored for long periods of time. Another way to prevent cyberattacks is employee training, encourage the use of strong passwords an dhow to detect fraud and phishing attacks.
hankunli

What Is a Point of Sale? | Beginner's Guide To POS Systems - 1 views

  • If you’re just starting up your small business, it is no doubt a daunting process. Before you can get to the fun part (selling your goods and services), there are a ton of decisions to be made.
  • selecting an appropriate point of sale system may be one of the more important decisions you’ll be facing
  • . Some small businesses may just use a cash drawer and/or a card reader to take payments.
  • ...24 more annotations...
  • However, POS systems have come a long way since then.
  • Cash Drawer
  • There are plenty of things you’ll have to keep in mind when it comes to selecting your POS. A good place to start is figuring out if you want a cloud-based system or one that is locally-installed. The difference between those types of systems is actually pretty easy.
  • Understanding POS Hardware Options
  • Types of POS Systems
  • Receipt Printer: T
  • Card Reader:
  • Barcode Scanner:
  • Tablet: 
  • Kitchen Display System: F
  • Scale: I
  • Restaurant? Retail? Or More Specific?
  • Retail-specific POS sy
  • Restaurant-specific systems
  • POS systems built just for that
  • 6 Common & Helpful Features In POS Systems
  • Inventory Management: 
  • Loyalty:
  • Customer Database
  • Reporting: 
  • Employee Management: 
  • Integrations:
  • How A POS Integration Or Add-On Can Simplify Managing Your Business
  • Quickbooks o
  •  
    This article explains what a POS system is and it goes into details about what to expect and what you can use a POS for when at work. POS systems ultimately make our jobs far easier both from an employee and a managerial position because all data can be stored and processed through the same system. Different POS systems can be used for different properties as well as for different styles of businesses, you select the system that fits best for what your business consists of.
  •  
    In this Article it talks about the POS Systems, to help you understand the point of sales software in a small business.
  •  
    This article is a guide for business beginners to choose a POS. It firstly explains the basic definitions of a POS system and made explanations for its usage. A top-tier point of sale system can do everything from inventory management to providing detailed reports and analytics. It can even help with online sales with eCommerce integrations - and many come with built-in card processor services as well. Different kinds of POS includes cloud-based ones and locally-installed ones. Also, there are POS that are compatible with Android. iOS, or both. POS can sync with many hardware such as scale, card reader, and code scanner. This article also explains on how to select a POS system. It finally encouraged the readers to get a POS for their own businesses.
zihanwang

4 ways ecommerce is impacting the hospitality industry - Insights - 0 views

  • The ecommerce explosion has impacted the way business is done online
  • Enhanced customer service, automated marketing, customer-specific advertising
  • four ways ecommerce is impacting the hospitality industry
  • ...10 more annotations...
  • A personalized service tailored to the customer
  • Virtual reality brings the experience to the customer
  • Tapping into an increasingly international market using data
  • Retargeting to chase up lost sales
  • Virtual and augmented reality is fast becoming a normal part of everyday life, most noticeably in ecommerce.
  • Many hotels now let customers take a virtual tour of their building right there on the hotel’s website. The Thai hotel and resort chain Amari, for example, offers virtual tours of all its premises, including 360° panoramic views of its lobbies, exterior, and hotel rooms.
  • By analyzing weather reports, local events schedules and more, Marriott is able to forecast demand and calculate the value of individual rooms during busy — and not so busy — periods of the season.
  • Ecommerce has blown the international market wide open.
  • It’s important for hospitality brands to stay ahead when anticipating customer needs, and personalization is an important method of doing so.
  • Another way ecommerce is impacting the hospitality industry is through the normalization of sophisticated tracking and retargeting.
  •  
    This article talks about how ecommerce has impacted the way business is done online within the hospotality industry with enhanced customer service, automated marketing, customer-specific advertising.
  • ...4 more comments...
  •  
    This age of technology has become so powerful that it is used widely for travel. Consumers are looking for a personal experience, not something that is meant for everyone. eCommerce has evolved and made it very easy for retailers to obtain customer information. With that information they are able to customized ads for you based on your searches. Virtual reality is also a new way for consumers to be able to see if an item good for their home. It allows you to get a feel of the product before using. Hotels allow the opportunity for guests to get a feel of the hotel before going.
  •  
    In this article, the author gave a bird's eye view of how the hospitality industry in 2019 was impacted by e-commerce in 4 ways. Firstly, e-commerce focused on the individual to foster greater engagement and boost sales by creating a personalized experience for each guest, based on the data gathered on them. Secondly, through the adoption of virtual and augmented reality, e-commerce was able to allow customers to experience their products before purchase. Thirdly, e-commerce has given hospitality businesses, global access to clients that a brick and mortar business could not facilitate. Lastly, e-commerce has given hospitality businesses the ability to recapture lost sales, from potential customers who may have left their sites before purchasing.
  •  
    This article is about ways in ecormmerce has an impact on the hospitality industry.
  •  
    Virtual reality is becoming a normal part of everyday life in eCommerce. Most hotels now let customers take a virtual tour of their building before they book a stay at the property. E-commerce has blown the international market wide open for consumers that were previously out-of-bounds.
  •  
    As the hospitality industry continue to grow we should urge to monitor the current trends of consumer needs. Anticipation of what they may look for such as discount codes and personalized experiences are big pluses when it comes to satisfaction. An additional feature that customers are now being attached to is the virtual trend of placing furniture or items that you may purchase online in space of your home to see if it fits your look.
  •  
    This article introduce four ways that E-commerce impact on hospitality industry. Ecommerce is opening up new avenues for businesses all over the world across a variety of industries. Hospitality has a lot to gain from adopting new technology and ecommerce innovations. In Hospitality and Tourism industry, hardware, software, information management, and telecommunications systems have allowed for the processing and information flow amongst organizations. We consider the importance of the trend of Information Technology by implementing an effective IT system for advertising, distribution, encouragement and co-ordination of the industry. It is important that Hotel Industry take the lead of the emerging technologies to improve management abilities and develop business plans focusing on the most efficient income of delivering value added products to clients.
jackyreis

The Cybersecurity 202: Facebook disclosed a major hack very quickly. But the alert was short on details. - The Washington Post - 0 views

  • The Cybersecurity 202: Facebook disclosed a major hack very quickly. But the alert was short on details.
  • It took just three days for Facebook to notify authorities and the public that  hackers had compromised as many as 50 million user accounts on the social media platform.
  • Facebook leaders did not have enough information to paint a clear picture of the hack and the risk to its users during the announcement.
  • ...12 more annotations...
  • Europe’s new privacy law, the General Data Protection Regulation, imposes massive fines on companies if they don’t notify privacy regulators about a data breach within 72 hours. The rule took effect in May and applies to any company with E.U. customers. U.S. lawmakers have proposed similar a 72-hour rule to replace the patchwork of state data breach laws that exist here
  • The company said Friday it had notified European data privacy regulators of the breach, in accordance with GDPR. Shortly after doing so, Ireland’s Data Protection Commission, the watchdog that monitors Facebook’s GDPR compliance, said Facebook’s disclosure “lacks detail” and criticized the company for being “unable to clarify the nature of the breach and the risk for users at this point.”
  •  Equifax waited six weeks to reveal that the Social Security numbers and other sensitive information on 143 million Americans had been exposed in a data breach. Uber waited a year to reveal a hack affecting tens of millions of drivers — and just last week paid a $148 million settlement in connection with the incident. Yahoo also paid a fine earlier this year for waiting two years to tell investors that Russian hackers stole information on 500 million users. 
  • Wray stressed that cyberattacks and theft of intellectual property can inflict long-term damage on American companies,
  • No country poses a broader, more severe intelligence collection threat than China.
  • The Energy Department on Monday announced awards of up to $28 million to help fund 11 cybersecurity research projects to strengthen the defenses of America's critical energy infrastructure,
  • Karen Evans, the assistant secretary for the department's Office of Cybersecurity, Energy Security, and Emergency Response, said “energy cybersecurity and resilience” is one of the “most important security challenges” that the United States faces.
  • “The frequency, scale, and sophistication of cyber threats have increased and attacks can be much easier to launch,”
  • “Cyber incidents have the potential to interrupt energy services, damage highly specialized equipment and threaten human health and safety.”
  • The Senate Commerce Committee should hear from consumer privacy experts as lawmakers consider whether to develop data privacy legislation, a coalition of consumer and privacy groups said Monday
  • And while civilian agencies generally face the most lopsided age disparities, the importance departments place on building a long-term talent pipeline varies greatly
  • That means federal technologists at or approaching retirement age outnumbered their 20-something counterparts roughly 4.6 to 1.”
  •  
    This article highlights the importance of announcing a security breach quickly, and explains the argument on whether it needs to be carefully analyzed before releasing the breach. It explains the importance of releasing the understanding of a hack as quickly as possible to maintain people's information (i.e. bank information) safe.
leonfai

Why cybersecurity matters | Hotel Management - 0 views

  • Cybersecurity is not just a buzzword. In today’s technology-abundant world, it has become a critical undertaking for companies across all industries—including hospitality.
  • Trustwave’s "2018 Global Security Report" lists hospitality as one of the top three industries most vulnerable to payment card breaches. Other estimates project that hotels are the unwelcome recipients of around 20 percent of all cyberattacks.
  • Additional anecdotal evidence supports these numbers. One need not look further than Marriott International’s Starwood Hotels & Resorts Worldwide group, which recently disclosed the theft of more than 25 million passport numbers and 380 million unique guests’ personal information.
  • ...9 more annotations...
  • After all, the industry has been and continues to be focused on cultivating a user-friendly atmosphere. Unfortunately, for hackers this combination is nothing short of a gold mine.
  • Since a businesses' hard-earned reputation relies heavily on instilling confidence in its customer base, a breach of trust is sure to compromise that relationship. If an attack affects millions and is publicized to millions more, the impact on brand equity can be difficult to recover. 
  • Marriott, for instance, was criticized not only for the breach, but also for responding inadequately and unprofessionally.
  • In short, as more and more consumers become aware of the importance of reliable cybersecurity, a hotel that neglects this pain point is compromising the strength of its product among its competitive set. 
  • Considering that the annual frequency and severity of cyberattacks are only rising, the time is now to establish organizationwide security operations, recovery plans and budget allocations.
  • a cohesive top-to-bottom strategy is required and often is best delegated to a trusted strategic advisor with depth of experience in cybersecurity breach prevention and resolution.
  • Next, the goal becomes full-scale protection. From the technical side, this includes setting up firewalls and securing weak points (such as point-of-sale terminals).
  • There needs to be an efficient method for detecting the attack and mitigating any damages. Lastly, to avoid the pitfalls noted above, a predetermined plan to address this worst-case scenario is vital. From reviewing insurance policies to preparing for impending litigation, recovery is a process best started with a go-to advisor before it is needed. 
  • The only way to avoid being another statistic in future Internet crime reports is by staying as ahead of the looming threats as possible.
  •  
    This article talks about how cyber security is very important to the safety of the personal information.
  •  
    Author, Lena Combs, discusses why hospitality has become vulnerable to cyber attack. Ranging from the failure to secure POS systems and credit card data. To hotels' inability to detect and effectively respond to potential cyber threats. Combs outlines the steps involved in implementing a cohesive top- to bottom strategy that will effectively address these dilemmas. More importantly, why doing so protects a hotel's bottom line and brand positioning.
  •  
    The following article highlights the importance of cybersecurity in general and why it is especially important in the hotel industry. This highlights many facets, one being the fact that the hotel industry is one of the most vulnerable to cyber-attacks, therefore, needing to have top-notch cybersecurity.
cjdearmas

How hotel chains are tackling the cybersecurity challenge - 1 views

  • With customers getting increasingly tech-savvy and looking for better deals, smarter platforms, and intelligent options when traveling, the hospitality industry is struggling to protect margins.
  • As a result, the industry is undergoing a period of consolidation.
  • This is exactly how Marriott International became the world’s largest hotel chain — it acquired Starwood Hotels & Resorts Worldwide for US$13.6 billion.
  • ...8 more annotations...
  • However, at the time, due diligence failed to discover that Starwood had fallen victim to a data breach prior to the deal which exposed customer data of 500 million guests and subjected the hotel to penalties from regulatory authorities.
  • For those in the hospitality industry, looking to acquire properties or not, cybersecurity should be something to pay attention to — after all, the risks of not defending against cyberattacks could be catastrophic with regulators tightening the noose on those that fail.
  • The incident, of course, hasn’t dampened spirits at Marriott.
  • “The hotel industry is at risk of attacks, such as malware and ransomware, where criminals try to either steal data or exploit organizations for a pay-off. The majority of these threats come through over email, often in malicious links.
  • Given Marriott’s size and cash reserves, it was able to weather the hit it took in the stock market, compensate (loyal) customers, and cough up the fines levied on it. Others might not.
    • tcale003
       
      When Mariott bought other smaller hotels and added them to their inventory, they were not careful about their cyber-security and there was a data breach. The hotel industry is at risk of being attacked by things such as malware and ransomeware. Hotels need to pay attention to Cyber-security or risk having criminals steal valuable information.
  • Hotels house banks of sensitive
  • Hotels house banks of sensitive
  •  
    email security is a good defense against cyberthreats in the hospitality space because it not only helps fend off attacks but also sensitizes staff to risks in cyberspace and provides them with basic awareness and education.
  •  
    Mariott learned the hard way about the importance of cyber security! By inquiring a hotel for their boutique hotel line, it wasn't until after the fact that they realized that the hotel had been hit by a huge data breach in their system. Luckily, Marriott has the resources and reputation to deal with the issue. But a lot of these smaller hotels do not, so the damage to them could be catastrophic.
  •  
    "The hotel industry is at risk of attacks, such as malware and ransomware, where criminals try to either steal data or exploit organizations" Majority of threats come through over email, often in malicious links. deploying email security is a good defense against cyberthreats in the hospitality space because it helps fend off attacks.
jackyreis

Price Comparison: 7 Best Event Registration Software - 1 views

  • Price Comparison: 7 Best Event Registration Software
  • How to Choose Event Registration Software
  • Key Features
  • ...25 more annotations...
  • Reputation
  • Attendee Engagement
  • Extra tools 
  • Pricing
  • 1. Eventbrite
  • Pros: Eventbrite is a software that is commonly used across industries. It’s a good choice for a small social event or party as well.
  • Cons: This software may be good for event registration but lacks attendee engagement functionalities. The fee has also been steadily increasing. 
  • 2. Whova
  • Pros: This event registration tool may be a good option especially for European events. It is a robust software for large enterprise-level conferences and trade fairs.
  • Cons: If you expect fewer than 50 attendees, or if your event is a wedding or party, Whova may not be a good fit.
  • 3. Xing Events
  • Pros: Whova has almost the lowest per-ticket price in the industry, capped at $5, so it is a great option for higher ticket prices. It also offers a suite of features that significantly boost attendee participation and interactions through the event app. Two birds, one stone (read more: save money on event registration tool & double audience participation).
  • Cons: It offers an app for event check-in, but similar to other traditional brands, its strength may not be in offering modern mobile technology for audience engagement and attendee networking.
  • 4. Brown Paper Tickets
  • Pros: They work well with charity events, performances, and various non-profit / school events.
  • Cons: This software may not be a great choice for mid- or large-scale conferences, and some customers have complained that the reporting is not very robust.
  • 5. Wild Apricot
  • Pros:  It may be affordable for a small community’s regular gatherings. It has various pricing options for different types and sizes of organizations. It is integrated with Whova all-in-one attendee engagement and logistic management system, so you can easily sync your registrant information with Whova.
  • Cons: If you only have an annual event and do not need to manage membership, it may not be a good fit for you.
  • 6. Ticketleap
  • Pros: This event registration software is simple to use and works well with relatively small events and performances.
  • Cons: It doesn’t offer the complex organizational tools of conference registration software, so it might not be a good fit for large, multi-day, multi-track conferences.
  • 7. Constant Contact
  • Pros: Constant Contact easily integrates with other systems (e.g. Whova, Eventbrite) so you can build invitations and registration into your email marketing campaigns.
  • Cons: This is an unnecessary solution if you don’t intend to send many emails to your contacts, as you will still need to be an Eventbrite customer to use the registration feature.
  •  
    This article was able to summarize all the different event registration softwares that are available currently and their pros and cons. It gives you a good idea on what software you would prefer for your company depending on what they have to offer.
hankunli

The Technology That Can Make Events Possible in a Pandemic - 0 views

  • The future is surely small outside of virtual events. While smaller events have a more substantial chance of happening, how soon may depend on a number of technologies that will directly impact the event feasibility.
  • Devising the safety logistics for groups of 50 to 100 people should be the immediate goal.
  • Digital tracking has been demonstrated to be one of the most effective ways
  • ...6 more annotations...
  • The one biotechnology we should all keep an eye on is the development of a vaccine.
  • everybody seems to be in agreement that a vaccine is the only definite way out of the crisis.
  • These purifiers, the press release reads, use a combination of technologies such as UVC lamps to deliver a virus free environment.
  • Technology that provides the ability to scan attendees upon entering the venue will become the norm at airports and event venues.
  • Event professionals will either need to select venues offering thermal scanning or bring their own provider on site. This could even become an opportunity for functional sponsorship as scanners become the norm going forward.
  • Technology offering digital signage is already present at venues and can be implemented via dedicated apps.
  •  
    During a pandemic when access to on-site events are limited, this article on Skift offered possible solutions to larger gatherings and events. Technologies like tracking will be useful, as well as medical solutions. Using purifiers, doing thermal scanning and digital signage on-site are also possible ways for events. To avoid contact in an event, using apps is also a good solution to deliver the necessary information. Clever, informed, and creative event professionals will be able to leverage current technology to deal with the changes and make events happen.
zihanwang

Data Security in the Hospitality Industry | CSU-Global Blog - 0 views

  • Restaurants, hotels, and other companies in the hospitality sector often have complex ownership structures in which there’s a franchisor, an individual owner or group of owners, and a management company that acts as the operator. Each of these groups may use different computer systems to store information, and the information can also frequently move across those systems.
  • Cybercriminals use this reliance on cards to infect point-of-sale (POS) systems with malware that steals credit and debit card information by scraping the data. In fact, it was reported in 2017 that out of 21 of the most high-profile hotel company data breaches that have occurred since 2010, 20 of them were a result of malware affecting POS systems.
  • Well-trained staff also know how to recognize social engineering attempts, and they understand an organization’s compliance requirements. The risk is that the hospitality industry involves a great deal of of seasonal work in which people might move on after only a few months, or they might be transferred.
  • ...14 more annotations...
  • This type of data risk is more subtle, and it involves employees selling data to third parties without the knowledge of the organization that employs them
  • Data security risks in the hospitality industry extend far beyond the reputation hit that a hotel can take if guests’ data is compromised. Industry and political regulators are becoming stricter in governing how organizations process and store personal data.
  • the job turnover rate in hospitality is as high as 90 percent
  • High Staff Turnover
  • From the perspective of cyber criminals, hospitality appears to offer an ideal target for conducting crimes, such as identity theft and credit card fraud, due to the existence of multiple databases and devices containing both Payment Card Information (PCI) and Personally Identifiable Information (PII).
  • Here are five of the biggest data security concerns in the hospitality industry:
  • Complex Ownership Structures
  • Reliance on Paying By Card
  • Information security is a pivotal aspect of many industries
  • Compliance
  • Insider Threats
  • Best data-protection practices for companies in the hospitality sector include… Always encrypting payment card information.Operating a continuous training program in cybersecurity to maintain a well-trained workforce.Always adhering to relevant regulations, such as PCI DSS.Use cybersecurity measures such as firewalls, network monitoring, anti-malware, and traffic filtering to protect against common threats.Conduct tests against your organization’s cybersecurity defenses in which you mirror the behavior of an actual hacker.Know where your data is and enforce the principle of least privileges to limit acce
  • ss to sensitive information.
  • organizations in the hospitality sector are better placed to implement a comprehensive information security strategy that entails the necessary procedures, processes, and people to improve cybersecurity within the hospitality industry.
  •  
    The article talks about cyber security threats in the hospitality industry. Threats range from high staff turn over so staff isn't trained thoroughly, to insider threats where employees can sell information to third parties, to Cyber-criminals who infect POS systems with credit cards.
  •  
    Data information security is very important to a business development.In my opinion, I think the relationship is inversely proportional. In other words, the more effective cyber security budget is invested, the less potential impact there is of customer information being stolen (being hacked). Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes.
tcale003

This $20 USB Cable Is A Dead Man's Switch For Your Laptop - 0 views

    • tcale003
       
      This article is about a new inexpensive technology called a Buzz Kill Cord. It has been recently created by Michael Altfield, a Software Engineer to prevent hacking across the globe for anti-theft protection if someone steals one of your computer or phone devices. This USB cable will destroy any and all information on your device.
  • Most people are familiar with the concept of a dead man's switch that, for example, activates the emergency brake should a London Underground train driver become incapacitated.
  • Most people are familiar with the concept of a dead man's switch that, for example, activates the emergency brake should a London Underground train driver become incapacitated.
  • ...10 more annotations...
  • Most people are familiar with the concept of a dead man's switch that, for example, activates the emergency brake should a London Underground train driver become incapacitated. There are many different technologies across multiple machines from the trains mentioned above right through to chainsaws. Unsurprisingly, laptop computers haven't been on the list until now. Software engineer and sysadmin, Michael Altfield, has created a cheap "kill cord" that can trigger a laptop to self-destruct if stolen by a snatch and grab thief. What's more, you can make your own for just $20 (£15) but there's an important caveat: this is for Linux laptops, not those running macOS or Windows.
  • Most people are familiar with the concept of a dead man's switch that, for example, activates the emergency brake should a London Underground train driver become incapacitated.
  • Most people are familiar with the concept of a dead man's switch that, for example, activates the emergency brake should a London Underground train driver become incapacitated.
  • le, ac
  • There are many different technologies across multiple machines from the trains mentioned above right through to chainsaws. Unsurprisingly, laptop computers haven't been on the list until now. Software engineer and sysadmin, Michael Altfield, has created a cheap "kill cord" that can trigger a laptop to self-destruct if stolen by a snatch and grab thief. What's more, you can make your own for just $20 (£15) but there's an important caveat: this is for Linux laptops, not those running macOS or Windows.
  • Although laptops can crash, the consequences will likely not be as devastating as a runaway train incident. So why would anyone want a "kill cord" for their laptop? Good question, and one answered by software engineer Michael Altfield in his blog posting that describes how he made one.
  • if you were doing some online banking or accessing your work network via a VPN, the opportunity to monetize the theft becomes apparent. That scenario isn't far-fetched either.
  • Stand up if you use your laptop in a coffee shop or some other public place like an airport.
  • I'm guessing nobody is sitting down at this point. Yet by using either distraction tactics or a more straightforward and violent strategy, a thief could steal your fired up and authenticated laptop in seconds. Encryption won't help much if you have authenticated and are accessing that data, or service, at the time of the snatch and grab.
  • Altfield wanted an anti-theft solution that could trigger the laptop to shut down, lock, or even wipe all data in such a physical separation scenario. "I couldn’t find a low-tech solution that implements a laptop kill cord," he said, "so I decided to build one myself." The result is what Altfield calls a "BusKill" cable.
« First ‹ Previous 1361 - 1380 of 1553 Next › Last »
Showing 20 items per page