Skip to main content

Home/ Hospitality Technology/ Group items matching "networking." in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Avril Emmanuel

Keeping Pace with Event Management Technology in the 21st Century | Business 2 Community - 0 views

  • From social media to mobile devices to location based services, technology is becoming more and more important for a successful event.
  • Technology can be a powerful tool in creating valuable and memorable events.
  • Secondly, technology can also help encourage communication at an event.
  • ...4 more annotations...
  • For one, technology can help an event go much smoother.
  • Third of all, technology is almost expected.
  • As a Director of Product Management at a leading event management software company
  • When I look at the future, I see the many different ways technology will help event managers produce better events with greater efficiency and higher levels of satisfaction among attendees.
  •  
    This article by Brian Woodrick, Director of Product Management for an event management software company, talks of 3 ways technology can add to an event manager's job. 1.Help an event go smoother 2. Encourage communication at an event 3. Technology is expected Woodrick specifically mentions social media and mobile devices which can enhance networking for an event planner. Today everyone wants their information faster and convenient. Utilizing the technology outlets that are already being used to reach customers and have them interact with each other would definitely help make an event planner's job easier. Event Planning comes with trends and a technology forward customer base is the trend right now. Taking event planning into technology be it social media or a event management system would take away a lot of the day to day traveling just to network and get contracts signed for an event.
Hyeyoung Jang

IT in hospitality - Express Computer - 1 views

  • Hospitality is amongst the fastest growing sectors in India today, with domestic and foreign tourism, and increased business travelers fueling this momentum. The sector is known to hold as much promise for the country as the much touted IT, ITeS and manufacturing industries. India’s travel and tourism industry is expected to grow 8.4% this year and 8% annually between now and 2016, according to the World Travel & Tourism Council. Conventionally having stayed away from technology, the hotel industry in India is observing a sea change—in its objective and management’s role towards delivering quality customer service. ‘Service’, related to personalized care and hospitality, is finding a friend in advanced systems and gadgets that enhance the service delivered.
  •  
    This article talk about the IT in hospitality industry. They give a example of the India. The number of the India's travel and tourism industry is grow 8.4% in 2008 and will be 8% more increase between now and 2016 according to the World Travel and Tourism Council. The hospitality industry should know the customers needs and the goal of the meeting them should be figured out in such a way that the cost of offering the service(s) does not pinch the company balance sheet i.e. variable costs should not show fluctuations northwards. Marketing gurus would always adhere to one statement for advice: cost need to be justifiable through high probability of ROI. The selection of technology in itself is a vital step. Another global feature that is extremely important is a detailed guest, group and company records. Used with a variety of customized reports, these detailed records allow precise targeting of various marketing efforts to improve occupancy rates, increase yield and enhance strategic planning. Each module should have a customizable report selection menu. The reports should have provision for sorting and filtering of data to enable viewing of the exact information might be required at a moment's notice. A good PMS enables a hospitality enterprise to increase revenue and occupancy, improve guest loyalty and reduce costs by centralizing and streamlining your operations. Forward-thinking properties have already begun building a network infrastructure that offers the flexibility and scalability to adapt to the ever-evolving guest, staff, and property management needs. Ajay Goel, Senior VP - Industry Business, Strategy, Operations, Cisco Systems India & SAARC opined, "These next-generation infrastructures are based on a converged network. They integrate with today's solutions-such as reservation, surveillance, and billing systems-and support the newest applications and technologies. The goal is to take advantage of tomorrow's opportunities while protecting e
Jiaqi Xu

IT investment proves a help to struggling Station Casinos - 2 views

  • Station Casinos, which runs 18 casinos and hotels that are located off the Vegas Strip and primarily serve residents of the Las Vegas area rather than tourists, is seeing major benefits from the heavy investment in unified communications, unified computing and wireless technology, said company officials accompanying journalists on a tour of the Red Rock Casino and Resort here during the Cisco Live conference this week.
  • Unified Computing System (UCS
  • Cisco's Call Manager software.
  • ...2 more annotations...
  • wireless IPICS,
  • The UCS and related technologies that Station Casinos has installed have made the network more adaptable and resilient,
  •  
    Unified Computing System (UCS) technology is widely used byStation Casinos Inc., which is a one of high-tech Station Casinos Inc. invested and do a good implement in their properties. It not only help this company do a good business and also help the it employees keep their jobs.
  • ...2 more comments...
  •  
    I see that about 80% of our revenue comes from slot machines, I think that's why IT investment means a lot and so helpful for them.
  •  
    Station Casinos Inc. was struggling to reorganize under bankruptcy protection. And the last, company decided to increase the IT investment to solve this problem. Station Casinos, which runs 18 casinos and hotels that are located off the Vegas Strip and primarily serve residents of the Las Vegas area rather than tourists, is seeing major benefits from the heavy investment in unified communications, unified computing and wireless technology recent network installations include a variety of Cisco Systems Inc. technologies, according to Baltz and Bryan Miles, director of networking and telecommunications. The company has deployed 3,000 of 9,000 Internet Protocol phones so far, and it is using Cisco's new Unified Computing System (UCS) technology to consolidate data center operations. Miles said UCS allowed the company to cut the number of data center server racks from 12 to one. Cisco officials noted that IPICS systems are normally used by emergency personnel to communicate across various wireless bands while responding to fires or other disasters. The updates to the Station Casinos network have helped the company connect 15,000 different devices, including some of the 23,000 newer slot machines installed at its various casinos.
  •  
    Hotel guests are a captive audience and are often looking for the convenience factor when making their purchasing decisions, such as where to eat that night. If hoteliers take the initiative with their WiFi solution, they could be soon be reaping the financial rewards.
  •  
    Implementing the right technology can bring a company back to business therefore it is really important to Know what technology is the best for the organization in order to improve productivity and attract potential clients.
Heather Del Ponte

Are You Practicing Proper Social Networking Etiquette? - Forbes.com - 0 views

  •  
    This article brings up alot of great points regarding social networking in the business world. You can become facebook friends with coworkers, but you have to be careful with what image you are protraying. They could be checking to make sure that you are not making a bad image that could reflect on the company.
Dibakar Desouza

Linkedin - Networking Tool - 2 views

  •  
    The reason for this post is that i am currently using Linkedin part of my networking tool and i am sure many are using this as well. With this tool, you can really use it to its maximum capacity including, having discussions on certain topics, posting job vacanies, getting to know people of your own field of work, creating a group and inviting people to join the group.... the functions are endless. I really use this effectively on a daily basis trying to find candidates, posting jobs and i do get a lot of responses as well.
  •  
    Do agree! Linkedin provides an effective way to network professionally and beyond. I also use the tool daily to keep abreast on trends, analysis, and personal network of professional affiliates. Ernest Bailey | LinkedIn profile http://linkd.in/19filwl
Le Chai

SDD (JAZZ Fusion) - Cloud-Based Communications Billing Software and Telecom Profitability Services Designed for the Hospitality Industry - Hotel Management Network - 0 views

  • JAZZ Fusion can be implemented as premise-based software serving a single property, as hosted software serving an entire customer enterprise, or as a software service (SaaS) that can be subscribed to over public and private networks.
  • The benefits of JAZZ Fusion include:
  • Key technology advantages:
  •  
    This article introduce a software called SDD(Jazz Fusion), which is dealing services with customers and all the functions and benefits of this system. SDD provides internet and VIOP services, shifts voice technology integration, consolidate cloud to allow hotels maintain voice-switching system and magnify with TeleManager services. Voice and internet billing, telecommunication management, and ongoing profitability support. 
smaka004

How Marriott Wants to be the Red Bull of the Hotel Industry | Variety - 0 views

  • Marriott International today announced the formation of an internal content studio through which it will develop, produce and distribute a slate of entertainment projects that will include web series, short films, TV shows, music events and movies. The goal for the Bethesda, Maryland-based company is to appeal to the “next-generation traveler” — made up mostly of millennials — with story driven content marketing.
  • With 18 brands, Marriott is the world’s largest hotel company with over 4,000 hotels in 78 countries. Through its individual properties, in-room TVs, websites, mobile platforms and reward program, Marriott certainly has the network through which it can distribute entertainment.
  • To promote the projects, Marriott will use its website; its mobile app; various social media channels; in-room TV network; and Marriott Rewards, a loyalty membership program that has over 45 million subscribers.
  •  
    Marriott is seeking to become the Red Bull of the hotel industry. While I first thought that this meant that it wanted to become synonymous as a brand with hotels generally, as Red Bull's brand is with energy drinks, what Marriott is actually pushing for is a sophisticated eMarketing strategy. The company is focusing on content marketing by developing and producing (in-house or through contract) its own videos, shows, web series, movies, musical events, etc. and distributing it through their network of properties. The distribution strategy will focus on using Marriott's 4,000 rooms, which are located across 78 different countries globally. In addition to pushing content through in-room TVs, Marriott will also use its rewards program and mobile app to distribute what it produces to its consumers. Marriott does not plan to abandon its print or online advertising; it is simply adding another platform to increase and diversify its global reach and strategy. The ultimate goal is to fill rooms, but with Millennials, creating long-lasting, individual, memorable experiences is important to overall brand loyalty. Thus, content marketing provides a means by which Marriott can offer original, targeted content to its consumers. In the future, it can become a full-fledged development studio providing complete content for its consumers, in turn pressuring companies like Netflix, Hulu, etc. In the short-term, producing content and releasing it through their app will allow Marriott to increase brand awareness, loyalty, and the overall guest experience. Over time, Marriott is not simply pushing a product or service; they are building meaningful relationships with their consumers.
anonymous

Cloud Security Corporation Signs LOI to Acquire Slice Networks - 0 views

This article is about emerging technology involving Cloud Security Corporation which is an innovative cloud computing company.Yesterday, Cloud Security Corporation decided to partner with leading S...

technology hospitality business tech mobile Software

started by anonymous on 30 Oct 13 no follow-up yet
anonymous

Cybersecurity Tactics for a Hotel Industry that's Under Siege - 0 views

  • Credit card fraud and identity theft should remain high on the hotel and lodging industry’s radar. Just ask Starwood Hotels & Resorts Worldwide (including their Westin, Sheraton and W Hotel brands), Hilton, Hyatt and the Trump Hotel Collection, all of which were victims of highly publicized, major breaches in the hospitality industry last year. 
  • Hotels need a ‘toolbelt’ of various security technologies that can be used to prevent malicious attacks. A managed firewall is essential, blocking dangerous traffic from coming onto the network and preventing sensitive data from being exfiltrated, or sent, to the hackers.
  • In the breaches mentioned above, point-of-sale (POS) systems were attacked and malware launched to acquire cardholder names, credit card numbers and expiration dates.
  • ...7 more annotations...
  • It can be difficult and expensive to hire and retain an IT security team
  • One way to implement these advanced toolsets includes outsourcing to a managed security firm specializing in this type of service
  • POS systems are a weak security point for many networks because they are constantly in use — and aren’t always patched, updated or protected from vulnerabilities as frequently as required.
  • personal details for hotel guests are frequently stored in a variety of locations, including billing, facilities, restaurants, etc.
  • otels are made even more vulnerable thanks to POS system provider breaches
  •   Phishing remains a particularly popular tactic used by hackers everywhere, including those that are targeting the hotel industry to trick both prospective guests, who give up credit card and personal details, and insiders, who then give up valuable login credentials.
  • File Integrity Monitoring (FIM), Unified Threat Management (UTM), and Security Information and Event Management (SIEM) should also be considered
  •  
    This article talks about how there is a serious concern in the hotel industry when it comes to credit card and identity theft. They talk about how all the major brands in the hotel industry were all victims of highly publicized, major breaches in the last year alone. Also, including airline and banks, hotels maintain a wealthy amount of database of personal and financial data. For example, with new technology systems being created, POS systems are a weak security point for many networks because they are constantly in use and are not always updated or even protected from vulnerabilities. The article talks about personal details for hotel guests are frequently stored in a variety of locations including restaurants, facilities, and government buildings, so hackers have a greater possibility to access your personal information. The bigger hotels are in more danger because of the volume of guests that come in and out of the location. Smaller hotels should be concerned not just about their security but also by ransomware, an increasingly favorable tactic to extort hoteliers by hackers who encrypt the hotels data making it inaccessible until ransom is paid for. I believe hotels need a toolbelt of various securtiy technologies that can be used to prevent future malicious attacks. I think by managing and implementing a firewall is essential which helps get rid of dangerous traffic from coming onto the network and preventing sensitive data from being hacked.
  • ...1 more comment...
  •  
    This article talks about the weakness and vulnerability of POS systems involving safety. It mentions the security breach that few companies, such as Starwood Hotels & Resorts Worldwide (including their Westin, Sheraton and W Hotel brands), Hilton, Hyatt and the Trump Hotel, faced last year (2016) involving credit card fraud and identity theft through their POS systems. It mentions how point-of-sale (POS) systems are not complete safe and how vulnerable they are because they are constantly in use and aren't always patched, updated, or protected from vulnerabilities as frequently as required. It suggests that enterprises should outsource their cyber security management to minimize costs, considering that is extremely expensive to hire and retain IT security team.
  •  
    MOD 10: This article discusses the main tactics of cyber hackers that target hotels. Point of sale (POS) systems are easy targets for hackers due to their constant use during operation hours and because of that their security measures aren't always up to date. Hotels have large data banks since they're storing consumer profile information such as home addresses, phone numbers and credit card numbers. There's a large risk when it comes to security breaches within franchises because they have access to their parent company's regional, national and global systems. If their systems are hacked and breached, then that puts the whole system of the brand at risk. Security breaches within a system can also damage a brands reputation with the public. According to the article, "Recent major breaches at Fortune 500 companies and household names across the retail, restaurant and hotel sectors demonstrate that anti-virus, anti-malware and firewalls alone are not enough to secure businesses from the ever-evolving threat landscape." Smaller properties are even at a greater risk because not only do they have to monitor their compliance with PCI but also monitoring their security systems for their database and PMS system. Some of the recommended software's that should be used by hotels looking to be proactive with their company's cyber security is File Integrity Monitoring(FIM), Unified Threat Management(UTM), and Security Information and Event Management(SIEM).
  •  
    This article explores the different tactics hotels should use after a cyber attack. The article mentions several different type of attacks such as Phishing when hackers trick customers into giving up their login credentials. Ransomware, when hackers encrypt data making it unusable and inaccessible for the hotel. Not one solution but rather companies should be equipped with a series of technologies from firewalls to file monitoring programs. Some of these technologies, like SIEM requires an intelligent IT team to have the capabilities of analyzing and monitoring the reports produced. This may be more difficult for smaller businesses to implement and maintain.
asant318

Ransomware: One of Hospitality's Biggest Threats in 2017 | News | Hospitality Magazine (HT) - 0 views

  • attack made headlines for locking guests out for their rooms
  • discuss how ransomware can affect the hospitality industry and what hotels and restaurants should consider to protect themselves from future cyber attacks.
  • Travelers may be annoyed, but for the hotel, ransomware can be a major business disruption.
  • ...10 more annotations...
  • The cyber threat has been used to target a variety of businesses from hospitals to retailers and now the hospitality industry
  • , businesses need to always be ready for a breach. Every business should have an action plan in place to prevent their company from being the next victim of ransomware or any other cyber security threat.
  • pirated software, file attachments, web links, and suspicious emails.
  • important to act quickly by segmenting portions of the infected network and removing devices to try and prevent the problem from spreading.
  • best practices for any company to employ are regular backups and a tested disaster recovery plan
  • Using anti-malware software is a necessary start, but it will not stop everything – especially rogue software downloaded by employees
  • keep additional devices from being infected.
  • install ransomware protection
  • malicious software will continue to rise as businesses and consumers become more dependent on the internet for everyday needs.
  • it’s important that businesses take proactive steps to protect not only company data, but the overall integrity of the company network from hackers.
  •  
    The article discusses ransomware attacks on hospitality properties. A 2016 attack left guests locked out of their rooms but the threat could affect different areas of a hospitality business and cause significant disruption to their business. Properties need to be prepared for a security breach with an action plan to prevent cyber-attack. The article points out that it's important to act quickly to segment the network and try to prevent any new devices from being infected. Best practice recommends regular backups and a recovery plan, using anti malware software and being cautious with employee installed software. The most important thing a company can do is to be proactive and prepared for an attack.
herzencortes

The Pros and Cons of IoT in the Hotel Industry | - 1 views

  • The Internet of Things is the network of physical objects embedded with electronics, software, sensors, and network connectivity enabling these objects to collect and exchange data.
  • “Third Wave of Innovation” following the Industrial Revolution and Internet Revolution.
  • The hotel industry has already started implementing IoT strategies into their properties to increase guest satisfaction, decrease unnecessary costs and labor, and increase productivity.
  • ...9 more annotations...
  • top five trends
  • IoT Drawbacks in Hospitality
  • cyber-attacks and security breaches
  • “a smart energy management system knows when a guest room is unoccupied and can automatically adjust the temperature to reduce energy consumption by as much as 20-45 percent,”
    • herzencortes
       
      Energy consumption is only one aspect where IoT can help, but more so, it will help in maintenance, sales, and overall guest experience in the hospitality industry
  • The Internet of Things is the network of physical objects embedded with electronics, software, sensors, and network connectivity enabling these objects to collect and exchange data.
    • herzencortes
       
      The internet of things is a fascinating concept, in the future it will help companies collect more data than ever and then in turn this data will be use to cater to guests and market to a much more specific market
  • Guest-room Automation
    • herzencortes
       
      Guest room automation, in my opinion is the next big thing. Today we see air conditioners that can turn off when guests leave rooms, lights that dim with natural lights, and televisions that turn on and off depending on guests being or not present
  • Predictive Maintenance – Predictive maintenance takes preventive maintenance one-step further by using sensor data to recognize hazardous trends and alert the appropriate maintenance engineer before the issue escalates.
    • herzencortes
       
      Predictive maintenance is imperative to keeping a property in shape. By including IoT labor costs and maintenance costs can be brought down
  • Mobile Engagement –
    • herzencortes
       
      Social media is king, andhaving data that allows for properties and other companies to target their posts can make the difference
  • Hyper-Personalization
    • herzencortes
       
      Particularly with high end properties, personalization is an important part of building a recurring client base and differentiation.
  •  
    More and more, hotels are using IoT (the Internet of Things) strategies. Just like we can use our phones to lock/unlock our house's front door, hotels can use different devices in their properties to boost a guest's satisfaction. Currently, some of the top IoT trends are: Guest-room automation, where a guest's room can change the temperature, switch on/off the lights, and do a few more personalizations around the room depending on whether or not a guest is currently in there; Predictive maintenance, where sensor data is used to prevent issues by recognizing dangerous trends and notifying maintenance before it gets worse; Mobile engagement, where guests can use their phones as room keys among other things; and Hyper-personalization, where rooms could remember a guest's room preferences (temp, lighting, tv channels, etc.) and then set up the room the same way the next time they stayed. However, the fact that all of this is internet-enabled means that there is also a significant risk of information being hacked into and stolen.
ppate011

GDS business can be a significant source of incremental bookings and increased margin for hotels | Bookassist blog - 0 views

  • Every hotelier knows the advantage of direct online bookings to their hotel. But there is more to direct than just bookings on your website booking engine.
  • At Bookassist our metasearch management team has delivered metasearch bookings growth of 130% in the first quarter of 2018 versus the last quarter of 2017 (see https://bookassist.org/company/testimonials/en/)
  • The GDS is a large computer network that represents a single point of entry to travel agents and travel sites worldwide
  • ...7 more annotations...
  • A 2017 study of more than 900 travel agents located throughout 52 countries revealed that travel agents are continuing to report a record use of the GDS for hotel reservations.
  • It’s important to note also that GDS corporate business typically delivers a quality customer that usually augments hotel F&B/C&B revenue using his employer expenses to wine and dine in the hotel, in contrast to leisure travellers who tend to spend outside the hotel.
  • Because of the fixed transaction fee element, calculation of the CPA of a GDS booking will depend on the hotel sale rate achieved and the length of stay.
  • For the individual hotelier, the requirements for applying to consortia or account managing their property on the GDS can be onerous.
  • RFP is “request for proposal”, where companies make the market aware of the volume of bednights they expect to need for the upcoming year.
  • GDS business can be a significant source of incremental bookings and increased margin.
  • It’s time to make sure that you are open for business on the GDS.
  •  
    Over the few years, travel agents are using booking through Global distribution systems. Hotels however are having to pay a 20% booking fee when people book through GDS. Travel agents are also now using Airbnb, and alternative booking, because they aren't seeing any commissions on them. GDS is a large computer network that represents a single point of entry to travel agents and meta search sites. GDS are heavily used in the business and corporate travel accounts. GDS corporate business typically delivers more revenue for hotels because business travelers usually eat and drink in the hotel, rather than travel outside the hotel and spend money. Travel agents use commissionable and non-commissionable booking that, where commissionable bookings must add typically 8-10% agency commission on top of the GDS fees. GDS can be a good source of incremental bookings and increase margins.
  •  
    Over the few years, travel agents are using booking through Global distribution systems. Hotels however are having to pay a 20% booking fee when people book through GDS. Travel agents are also now using Airbnb, and alternative booking, because they aren't seeing any commissions on them. GDS is a large computer network that represents a single point of entry to travel agents and meta search sites. GDS are heavily used in the business and corporate travel accounts. GDS corporate business typically delivers more revenue for hotels because business travelers usually eat and drink in the hotel, rather than travel outside the hotel and spend money. Travel agents use commissionable and non-commissionable booking that, where commissionable bookings must add typically 8-10% agency commission on top of the GDS fees. GDS can be a good source of incremental bookings and increase margins.
kimmumford

The Role of Global Competer Reservation Systems in the Travel Industry Today and in the Future - 0 views

shared by kimmumford on 15 Jan 18 - No Cached
  • the best known global CRSs are AMADEUS, GALILEO, SABRE, and WORLDSPAN with AMADEUS being the only one which is largely owned by European airlines. Together with GALILEO, it is the leading system in the European market. GALILEO, however, also has a strong position in the US market after it merged with an American system. SABRE and WORLDSPAN have been developed in the US. So far, SABRE is the only CRS which is wholly owned by one single airline.
    • kimmumford
       
      Global CRS's
  • CRSs are systems for purely (information transfer) logistical functions
    • kimmumford
       
      CRS definition
  • he network of the global CRS AMADEUS has additional 14 network nodes distribers who thus have the latest information about availability at any point in time and can use it as a basis for a new offer. In addition, the system can also store customer related information such as e.g. all services provided to a certain customer, type of payment, service information etc. ♦ Fare Quote & Ticketing: Just like the product presentation, the fare quote, ticketing and voucher generating process depend on the type and the complexity of the services offered. For flights, multiple fares are being offered which differ according to the reservation category, the date of the journey, the day when the reservation was made, the route and the length of the stay. That means that practically each fare needs to be calculated individually. In addition, fare quotes can change daily. The prices of other service providers, however, are relatively fixed so that in most cases, they stay an unchanged part of the offer. For the ticketing, travel agencies receive a fixed number of ticket forms which may only be used after confirmation has been availability of particular reservation categories and possibly the fare. It may, however, be difficult to describe the products of other service providers appropriately with only a limited amount of information. Hotels, for example, have so far only been able to provide information about the price, the size of the bed and its approximate location which alone is not a meaningful description for potential customers. For this reason, it is intended to link the particular offers to visual multimedia technology to be able to provide more detailed information to the customer. ♦ Reservation: The core function of reservation systems and the main reason for developing them is the reservation of offered services in the travel industry. To this end, a so called Passenger Name Record (PNR) or Guest Name Record (GNR) is created for each passenger or each group of passengers. These records contain all services-related customer information. At the same time, this information is transferred to the internal inventory system of all service providFigure 2 Principel structure of CRSs N N P pr S Fare Quote and T Hotel- or Car-Systems Travel Agencies Tourism Tourism Tourism Tourism Stickynote
    • kimmumford
       
      AMADEUS network modes and criticism of CRS
  • ...5 more annotations...
  • The development of such systems was already started at the beginning of the sixties, the objective being at the time to automate seat reservations procedures of airlines. Today, the largest civil data centers and the most powerful communications networks are being used exclusively for this purpose.
    • kimmumford
       
      Began for one purpose which is now expanded.
  • Today, the user has direct access to essential travel information and can find further information in all CRSs about trade shows, visa regulations, particular events etc. Furthermore, programs and interfaces have been developed which facilitate the internal administration for each travel agent. Also invoicing, accounting, customer and quota management increasingly depend on the respective CRS. User prompting has significantly improved so that even inexperienced users can easily learn how to work with the reservation procedure. Since more and more PCs are being used in this area modern user interfaces have been introduced.
    • kimmumford
       
      Additional access for the CRS
  • Another weak point in the CRSs have always been additional functions since such functions would not increase the number of sold flight tickets. O
    • kimmumford
       
      Weak point
  • There are two approaches which can help to reduce distribution costs. On the one hand, the on-line services provide additional possibilities of cost-effective direct distribution to the end customer. Many airlines now offer access to their internal service provider systems via on-line services and in particular via Internet. This also helps reducing costs incurred by travel agents and fees to the CRSs. O
    • kimmumford
       
      two approaches to cost reduction
  • he so called “no frill carriers”, one of them being Southwest Airlines, have taken this one step further. In all areas, they avoid unnecessary costs (service, change of bookings, meals, etc.) and merely offer basic services, i.e. to transport a passenger from A to B at the best possible price.
    • kimmumford
       
      Offer basic services
  •  
    This article discusses the role of CRS and GDS in the travel industry. The author discusses the well known systems used. The authors further discuss the advantages and disadvantages of using these systems and ways to reduce the costs. These systems were believed to be entering extinction; however, there are still uses in the industry.
mannypinto

Five Ways Brands Can Adapt For The Era Of E-Commerce - 0 views

  •  
    This article is very interesting because it talks about how establishments like Sports Authority and Toys 'R' Us are out of business due to e-commerce sites like amazon, ebay, Jet.com and others. It explains how businesses can adapt to an era of e-commerce. The first thing a business can do is to consolidate inventory, in other words have all the inventory in one single pool instead of different channels like brands have done before. The second thing is to establish a two-day shipping network, here the article explains how consumers expect immediate gratification with online orders. We see grocery stores doing this but with faster shipping within hours. The third thing one can do is leverage from an existing e-commerce channels for visibility. A business can sell its products on networks that are already established such as amazon, Jet.com and ebay. The fourth thing a business can do is use brick-and-mortar channels to increase exposure, meaning using physical stores such as Sports Authority and Toys 'R' Us to help increase exposure. It explains that drop shipping to these companies will help sales, 0% of all retail purchases still happen in physical stores. The final thing a business can do is use its resources. It is important to have an e-commerce expert on your payroll to grow the business online which will help in sales and stay on top of the this era. The article finishes by explaining that adaptability is the future of retail, which I believe adaptability is the future for any business. It is important to adapt and keep making things easier and more convenient for consumers.
da7327

Using Mobile Event Apps as a Marketing Tool to Attract Event Planners , by Bob Vaez - 0 views

  • Today, however, new technology solutions such as mobile conference apps are on the top of mind for every event planner.
  • Destinations and properties can use mobile offerings as a new opportunity for a different type of relationship with event planers and to add value to their overall package and offerings.
  • this helps attendees manage the event schedule easier, enhance networking opportunities, interact with the event using audience response and navigate their way around the event and property right from their smartphones
  • ...8 more annotations...
  • Integrating partner technology relationships into our sales and marketing immediately increases our value in the eyes of potential business partners and ensures them that we understand their overall event goals and objectives."
  • She adds by highlighting that bringing new technologies to the table also helps with the sales process.
  • First is the opportunity to engage and educate potential clients (event organizers) looking to book meeting space and in the process forming a new relationship. The other is adding value to the overall hotel offering and building a stronger brand as well as increasing revenue.
  • Organizers benefit greatly when a destination offers additional marketing and event execution tools, which assist when positioning the experience to event stakeholders and decision makers. In addition having a technology relationship in place, saves the organizer time and money, by having pre-populated destination details and potential purchaser discounts."
  • It gives them an opportunity to experiment how audience response with smartphones work or how they can send conference updates and alerts to delegates faster and easier with mobile event apps.
  • If possible it would also be extremely beneficial to offer a demo or a free basic version of the technology to allow event planners experience and try a simple mobile event app before exposing or upselling them to the more advanced features.
  • Mixing technology promotion by Hotels is not a usual practice but it is becoming more mainstream.
  • It is also important to closely measure the ROI for any technology strategy such as offering mobile event apps as part of the experience at a hotel. The key measurement factors will be feedback from attendees and event planners as well as tracking how many event planners opt-in to use this technology for their events.
  •  
    This article talks about how hotels can use mobile event apps to attract event planners. Hotels can use these apps to not only add value to their offerings, but also set themselves apart from the competition. These mobile apps provide information on the meeting agenda, speakers, and hotel details to all attendees. Mobile event apps are beneficial to the event planners because the apps help facilitate communication, offer networking opportunities, and improve the overall digital experience. Hotels are able to move away from traditional meetings and offer planners something more, something intangible that will contribute to the event's overall success.
  •  
    The article introduces the benefit of using mobile event apps as a marketing tool. It is not a usual practice to mix technology promotion by hotels yet but it is becoming more mainstream. Destinations and properties can use mobile offerings as a marketing and sales tools to attract more event planner. It makes easier to organize the event more effectively and enhance the networking opportunities for attendees. Thus, properties will gain benefits greatly in terms of positioning and promotion of the services or facilities inside the business as a marketing tool. For example, mobile app can include the information about event and property service details, which will facilitate on-site communication and advertise hotel services via the app. It will, in turn, make the overall digital experience for attendees outstanding. As a measurement of success, properties can monitor ROI for new technology through feedback from attendees and event planners, and the number of events adapting mobile app.
irinatroitskaya

Hospitality: Shelter Your Business from Advanced Cyber Threats | Hospitality Technology - 0 views

  • According to Verizon’s 2017 Data Breach Investigations Report, accommodation was the top industry for point-of-sale intrusions.
  • Hospitality, whether hotels or restaurants, transact more credit cards than almost any other industry, making them an extremely attractive target.
  • The hospitality industry’s rapid push to digitalization means that it is still playing catch-up on the security front.
  • ...7 more annotations...
  • The 2017 Lodging Technology Study by Hospitality Technology found that 74% of hotels do not have breach protection and less than half use end-to-end encryption for cardholder data or use tokenization at the card swipe.
  • PoS systems are a weak security point for many networks as they are in constant use and often are not patched or updated.
  • Denial-of-Service attacks make up approximately 20% of hospitality cyber incidents.
  • Early detection is key to controlling attack costs and reputation damage.
  • Host- and network-based firewalls should be used as the first part of a layered security approach.
  • A good endpoint prevention stack consists of an antivirus solution to handle known threats and a prevention layer that effectively prevents unknown, advanced attacks.
  • No technology, however, can substitute for an overall culture of security.
  •  
    The article describes the main cyber threats that the hospitality companies face. Over past few years, nearly every major hotel group has been attacked. The same is true for the F&B industry. One of the reasons for that is that the hospitality companies are the ones that process credit card information more than in any other industries. Moreover, hotels and restaurants have many access points for the malware: from wifi networks to POS's. The attackers may also use the third party suppliers (for example, OTA's) to access the hotels' systems. Verizon 2017 Security Payment Report states that less than a half of all hospitality businesses have full credit card payment security compliance. The main type of the attack is POS intrusion. Denial-of-Service Attacks constitute about 20% of the total number. Although they are not so dangerous in terms of sensitive information, they can disturb the company's operations causing significant losses as well. Thus, the hotels and restaurants need to invest in early detection protection provided by the effective firewalls and antiviruses. However, it is also very important to understand that no technology may ever fully substitute the security culture of the company's employees. Many attacks are conducted due to the personal weaknesses of the associates answering the calls, for example. So, in my opinion, in addition to the cyber security systems, there should be appropriate personnel training as well as well elaborated procedure protocols.
jiayi017

Stopping Data Breaches in Hospitality | Impact Networking - 0 views

  • Nearly half of all cyberattacks target SMBs, a number which is expected to increase.
  • Human error is the number one cause of data breaches from cyberattacks, with 52% of incidents directly attributable to them.
  • The majority of attacks that occur within businesses happen because somewhere along the line, someone made a mistake. Perhaps they opened an attachment they shouldn’t have or visited a risky website.
  • ...7 more annotations...
  • 93% of companies without a disaster recovery plan who suffer a major data disaster are out of business within one year.
  • SMBs simply don’t have the resources to survive breaches and are risking their entire business by not fully preparing against attacks.
  • Research suggests that 70% of consumers would stop doing business with a company if it experienced a data breach.
  • even for businesses who can survive a breach and save their data, long-term consequences can be dire.
  • Consider a true next-gen antivirus for everyone under your network to minimize the potential for attack.
  • By keeping all your data periodically backed up in secure data centers, you can rest a lot more easily knowing that should the worst happen, you can respond quickly and effectively.
  • One of the most effective ways of counteracting the dangers of cyberthreats is by training employees and establishing policies around a security strategy.
  •  
    This article describes the destructive effects of cyber attacks on enterprises, especially small and medium-sized enterprises. Because it does not have sufficient prevention and sufficient resources for disaster recovery. The most direct cause of current cyber attacks is that people open some risky websites or emails in the wrong place. For the hospitality industry, there is a large amount of customer privacy and sensitive information. Once attacked, its destructiveness is unimaginable. And to protect consumer data, most service industries just comply with local state laws, but most state laws have not made greater progress in information protection. Therefore, enterprises should protect themselves and their customers from cyber threats from the three aspects of their own network endpoints, disaster recovery and education.
Ashley Reed

Recent Trends in Event Management - 1 views

  • Recent Trends in Event Management
  • meetings and events this year is the introduction of Smartphone technology to business.
  • Publicis Meetings USA (PMUSA), revealed that the trend of using technology in meeting or event management will drive in forward, thanks to the increasing tech-savvy clients.
  • ...5 more annotations...
  • “Technological advances continue to be increasingly important and are leading to more requests for customization and interactivity in meetings and events…We expect technology to be at the core of several trends in the meetings industry in 2011."
  • Through the use of various mobile applications for event management, it becomes easier for the event managers and the producers to promote audience engagement, interactivity, and business-to-customer networking.
  • Today the trend of using mobile applications for event management has led the Smartphones to increase the technological and interactive aspects of a meeting or an event. There are various audience response and networking apps that helps in accomplishing tasks like customizing program agendas, and messaging.
  • The entrepreneurs and event managers have a coined the term “hybrid meetings” for the type of event management that comprises both the elements of a live meeting and a conference via the Internet.
  • With the use of applications like the Windows mobile apps, your Smartphone can be transformed into a hand-held PC.
  •  
    This article is an interesting one, highlighting the changes in trends in Event Management. The article starts off by explaining that the major changes in the meeting and planning areas of a business is due to the introduction of the smartphone technology in the business. It goes on the explain that there are mobile applications used just for events. It seems that the more that people and businesses become aware of the use of the mobile device as it relates to technology, it will make it even easier to customize and request different things for an event. Technology will be the core to different and new trends in the meeting and planning areas of businesses. It evident that the use of different mobile applications will make every thing easier for event managers. It allows managers to communicate with their customers and understand what exactly it is they need.
  •  
    This article looks at the rising use of Smartphones and smartphone apps for the event planning industry, and more specifically at industry meetings. The use of the technology makes it easier to connect the audience on points like engagement, interactivity, and business-to-customer- networking. As the importance of social media interaction in business, so does the need for interaction between business leaders increase as well, and helps to create a successful marketing event.
marble_bird

Hotel_ITSec.pdf - 0 views

shared by marble_bird on 15 Jul 20 - No Cached
  • During the past decade, information technology (IT) has significantly changed the way the hotel industry controls and manages operations. While many technologies have been utilized, some newer technologies have emerged in the literature and in practice, and many of them impact the hotel’s security.
  • Among the results, this study identified a gap between hoteliers’ understanding of IT budget adequacy and the adequacy of installed IT security systems.
  • Advancements in technology are increasing at a remarkable rate. As technology becomes more important, organizations that do not keep up with these advancements could lose business opportunities to other competitors that do
  • ...53 more annotations...
  • The four leading technologies which have showed a high adoption rate from the industry and have received attention from academia are: self-service, wireless, green, and security technologies. The advantages of these technologies for hoteliers include enhanced customer services and operational efficiency (Doyle, 2007), decreased guest wait times, more efficient methods to settle bills (Singh & Kasavana, 2005), reduction of energy costs (Meeroff & Scarlatos, 2007), and protection of sensitive customer data and credit card numbers
  • In addition, exploring the influential factors of security system usage will provide greater depth of knowledge with respect to why some hotels have adopted more security systems than others.
  • there is still a lack of understanding of the nature of risk associated with inadequate IT security, especially among operators of hotels that do not have their own IT departments.
  • Self-service technologies are commonly defined as devices or applications which permit users to produce a service independent from the direct involvement of the service provider (Meuter, Ostrom, Roundtree, & Bitner, 2000). The use of self-service technologies in the hotel industry has grown considerably, especially in the areas of self check-in, in-room check-out, and foodservice kiosks
  • IT systems refer to general support systems such as mainframe computer, mid-range computer, and local area network.
  • Some of the most significant wireless technology applications involve the use of mobile handheld devices, such as personal digital assistants (PDA), tablet PCs, and cellular phones, or RFID (radio frequency identification). RFID utilizes computer chips and antennas, allowing the chips to wirelessly communicate with a receiver.
  • While the major usage of RFID in the hotel industry was for inventory control purposes, it also has the potential to be utilized in ways that can provide more conveniences for the guests.
  • Other possible uses include placing RFID tags on items of high value as a means of theft prevention or integrating tags into guest loyalty cards for easy identification
  • IT investment that lowers environmental impact and IT that manages the environmental impact of other systems are commonly referred to as “green technology”
  • Many hoteliers might think becoming more environmentally friendly will cost more for their hotels. However, it has been demonstrated that “going green” is not only the right thing to do for the environment but also provides tangible bottom-line benefits for hotels by reducing consumption of energy and water, as well as other related costs.
  • Some of the risk factors involved include reliability, security, and privacy issues
  • A hotel with more technologies being utilized will install more security systems than those with fewer technologies.
  • Many of these attacks involve attempts by thieves to gain access to customer credit card data, and these attempts constitute a major portion of the risk inherent in IT security
  • if a system is breached and the merchant is not PCI compliant, the merchant then is responsible for all costs associated with improperly used credit card information taken from that system (Kress, 2008). These losses could bankrupt a business if the security breach goes undetected for even a short time.
  • IT security systems are those measures taken to protect the confidentiality and integrity of proprietary data.
  • two main paradigms of adoption are believed to occur: bottom-up adoption and top-down adoption.
  • Thus, it is reasonable to assume that organizational factors (e.g., financial factor, human resource) will influence the implementation stage of security systems at a hotel.
  • A hotel with sufficient IT budget will install more security systems than those with insufficient IT budget.
  • That is, if a hotel does not have its own IT department, it will have a negative influence on successfully installing or maintaining necessary security systems.
  • A hotel with its own IT department will install more security systems than those without.
  • Overall, the state of IT spending on security continues undiminished because managed security services are required for almost every application (Communications News, 2007).
  • risk associated with a breach of IT systems security (e.g., network break-ins) is very high. Consequently, no sector of the business community is exempt from attacks on their IT systems, with an attack being defined as a technique used to exploit a system’s vulnerabilities.
  • Given the importance of security and privacy at a luxury hotel, this study expects luxury properties to have installed more security systems than other segments
  • Most hotel employees use their property management systems for hotel operations and should be able to check their e-mails.
  • To justify the low response rate, previous studies which have compared response rates of mail and e-mail for surveys were reviewed.
  • the large majority of respondent properties do not have their own IT departments. Second, the people making IT decisions generally do not have IT backgrounds or training. Third, the large majority of respondent properties have little more than firewalls or antivirus software to protect their proprietary data, and these systems alone are not adequate to meet PCI standards, as they do not take steps to encrypt and protect cardholder data, maintain a vulnerability management program, implement strong access control measures, regularly monitor and test their networks, and maintain an information security policy as required by the Security Standards Council.
  • The respondents were asked to select from a total of fourteen securities related systems
  • The profile of the respondents revealed that they were experienced hoteliers with more than ten years experience in the industry
  • Fifty-three percent of the respondents reported that they were with chain hotels that would be considered mid-range properties with an average of 175 rooms (median of 107). Over 80% of the respondents reported working in operations, while fewer than 4% reported working in either IT or engineering (Table 1).
  • Nearly 70% of the respondents’ properties did not have their own IT department (69.2% did not have, and 30.8% had their own IT departments, n = 234, missing data = 10).
  • Fifty-three percent of them (n = 244) thought the most important goal for hotel technology would be enhancing the customer’s experience.
  • second identified goal was utilizing technology to help generate revenue (41%)
  • differentiate properties from their competition (20%), to lower expenses (16%), and to increase security (6%).
  • Internet kiosks in the lobby represented the most frequently used self-service technology (36.5%, n = 244), followed by kiosks for airline check-in/board pass
  • With respect to security systems currently in use, antivirus security systems represented the most frequently used security system (92.2%), followed by hardware firewalls, software firewalls, physical security, and encrypted login security systems.
  • intrusion detection was the most frequently identified system (15.6%), followed by vulnerability assessment scanning (13.5%), Internet scanning (13.1%), antivirus (11.5%), digital ID server (11.5%), and nonreusable passwords (9.8%; Table 2).
  • Thus, the hypothesis was supported that there was a linear relationship between the three factors and the adequacy of security systems.
  • The positive standardized coefficient (β) of .389 indicates that there was a statistically significant (p < .001) linear relationship between IT usage (the number of wireless, self-service, and green technologies a hotel was using) and the adequacy of security systems
  • The study revealed certain things of interest, the most significant of which is the need for greater emphasis on IT security among hoteliers.
  • only about 30% of all respondents reported having their own IT departments. Since budget hotel properties are extremely unlikely to have an IT department, it is highly likely that the very large majority of IT decisions throughout the industry are being made by hotel operators for whom IT is not their primary area of concern.
  • Furthermore, the focus of hoteliers for future IT implementations is enhancing the guest experience (53%) and generating revenue (41%). Very few respondents (6%) identified increasing security as a 5-year IT goal.
  • While almost all respondents use information systems as part of their jobs, very few are trained in the development, maintenance, and secure use of these systems.
  • no correlation was found between the respondents’ perceived adequacy of their IT budgets and the adequacy of installed security systems, as adequacy of IT budget did not appear as a significant term in the regression analysis.
  • Nearly 10% of respondents do not have so much as anti-virus protection for their systems, and nearly half do not even take simple physical precautions to protect their IT systems.
  • we note that no correlation exists between the respondents’ perceived adequacy of their IT budgets and the number of installed IT security systems, as the number of installed systems was not a significant factor in the regression analysis.
  • The sample obtained in this study represented the targeted sample: over 80% of the respondents were working in hotel operations. Furthermore, the purpose of this study was to explore hotel operators’ insight of technology usage, IT budget, and security measures rather than to confirm existing theories or to generalize the results.
  • it is reasonable to conclude that the respondents did not have an adequate understanding of the nature of the IT security hazards facing them for the average property does not have installed systems adequate to meet PCI standards, yet they reported having adequate budgets.
  • In order to adequately protect proprietary data, one must have an understanding of network security, which is an understanding apart from software functionality.
  • Properties with their own IT departments, however, reported that they had a higher number of installed IS security systems than did those properties without their own IT departments.
  • roperties without their own IT departments, in particular, have a less adequate understanding of their IT security needs than may be necessary.
  • This study found hoteliers’ lack of attention to security provision, training in IT, and PCI compliance can place hoteliers at great risk. For example, the cost of a single incident at a noncompliant property could result in the loss of the entire business.
  • It will be useful to examine the reasons why luxury properties are more likely to employ adequate security measures to determine whether this greater use is attributable to better understanding of security issues or some other factor.
  • The study was limited by the nature of online surveys; the response rate was quite low. Future studies could test the proposed research model via paper-based mail surveys to increase a response rate.
  •  
    This article covers a study performed on various hotels to determine management's level of IT knowledge and security implementations in relation to the hotel's IT security budget. The article discusses four types of technology impacting the hotel industry and how management responses to trending technology can affect a business, particularly in terms of a data breach and overall security. The study finds that an alarming percentage of hotel managers are not adequately informed on the risks and procedures of IT management and security, and many do not have proper IT security measures in place despite having an appropriate budget.
kburn039

E-commerce - Technology and business - Edexcel - GCSE Business Revision - Edexcel - BBC Bitesize - 0 views

shared by kburn039 on 13 Sep 20 - No Cached
  • E-commerce, or electronic commerce, refers to the buying and selling of products and services using devices connected to an electronic network, such as the internet.Three things are required for e-commerce to take place:a seller who has products and services that are displayed electronicallya buyer who has the equipment required to view the seller’s products and services, and a means of paying for thema network that enables information and payment to be exchanged by the buyer and seller
    • kburn039
       
      Could be a business, private party, third party, or family member.
  • E-commerce, or electronic commerce, refers to the buying and selling of products and services using devices connected to an electronic network, such as the internet.Three things are required for e-commerce to take place:a seller who has products and services that are displayed electronicallya buyer who has the equipment required to view the seller’s products and services, and a means of paying for thema network that enables information and payment to be exchanged by the buyer and seller
  • Disadvantages of e-commerce
    • kburn039
       
      A disadvantage that sums the four up is the loss of jobs due to technology taking over.
  • ...1 more annotation...
  • Advantages of e-commerce
    • kburn039
       
      E-Commerce has multiple benefits that will allow businesses to profit more with the numbers of technology use increasing every day.
« First ‹ Previous 161 - 180 of 796 Next › Last »
Showing 20 items per page