Skip to main content

Home/ Hospitality Technology/ Group items matching "Customers" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
10More

Cloud vs On-premise PMS for hotels: which one is better? - CiHMS - 0 views

  • On-premise Property Management System requires a significant number of “on property” hardware compared to the Cloud-based one. It gives the hoteliers total control: data and the system, system configurations, networks, updates, and changes are all yours to decide
  • Running the On-premises PMS means hoteliers must maintain a dedicated server room, which also needs an effective cooling system and an around-the-clock support team to keep everything up and running smoothly
  • With the cloud computing vendors, the PMS providers would be responsible for most of the IT operations expense. The hoteliers can also get the advantages from the cloud computing vendors’ highly available servers, at their optimal performance.
  • ...6 more annotations...
  • The hidden cost includes hardware server costs, additional IT staff expenses to manage the system infrastructure, maintenance fees (yes, more maintenance fees), and the expenses of other 3rd party software integrations
  • A cloud-based PMS has a much lower entry cost. They charge a fixed monthly subscription model, with a small initial setup fee. No server cost, maintenance fee, extra human resources cost, lower energy bills and is an extremely affordable budget for small and medium scaled hotel businesses
  • Although you can set up your On-premises PMS to be accessed from an off-site workstation or device, remote access can be affected by various factors. Getting real-time data can certainly be challenging, especially not at the speed that cloud-based PMS delivers
  • Undoubtedly, On-premises PMS is still ahead of the Cloud-based system when it comes to the number of integration capabilities, the flexibility of built-in reports that got customized, added over the years. 
  • a security breach can happen, losing your internal data, your brand reputation, revenue loss is unavoidable. 
  • It explains the widespread adoption of cloud-based systems. The only thing you have to hold responsible for is your Internet connectivity which is basic infrastructure any hotel should already have in place. In fact, the switch to cloud-based PMS is not impossible for the existing On-premises system.
  •  
    When it comes to deciding whether you should switch to cloud computing or remain with on-premises PMS, it all depends on your company. Many people fail to see the hidden costs associated with on-premise PMS such as hardware costs, IT staff to manage the infrastructure and expenses coming from 3rd party software integrations. Although on-premises PMS can be more customizable for companies, cloud-based systems are dominating. They reduce costs, are highly accessible in real time, fees are consistent, and are highly secured.
11More

What Is Planned Obsolescence? Major Tech Companies Rely On It - 1 views

  • A new regulation in France called the French repairability index requires a variety of tech products to publicize repairability scores, meaning the planned obsolescence behind major tech companies is finally coming to light.
  • This planned obsolescence business model is the foundation of many consumer industries, from fashion (especially in fast fashion) to shaving (ever hear of the razor and blades business model?). But one of its most interesting applications is in technology.
  • France launched the French repairability index. As part of this new program, France is now requiring manufacturers to clearly disclose repairability scores next to prices for five types of products: laptops, lawnmowers, smartphones, TVs, and washing machines.
    • teresastas
       
      I think this is a mandate that will help consumer's make better choices when it comes to purchasing tech. If something like this were to come to the US it would help consumers make more informed decisions.
  • ...4 more annotations...
  • Samsung products’ scores range from 5.6 to 8.2, as reported by Le Monde. As part of the French repairability index, Samsung actually published a free repair manual for its Samsung Galaxy phone, which should help customers avoid having to pay for a repair or replaceme
  • Microsoft’s website shows its scores for a variety of Surface laptops, which range from 3.7 to 4.1.
  • According to Apple’s French website, the company gave all varieties of its iPhone 12 a 6 out of 10; its iPhone 11 models all scored either 4.5 or 4.6; and its MacBook Pro computers scored between 5.6 and 7, meaning Apple’s scores top out around a C-. 
    • teresastas
       
      I am not surprised by these scores at all for Apple their business model is based off of Planned Obsolescence.
  • The new French repairability index forces tech companies to be more transparent about how easy it is to repair their products. With mounting piles of e-waste polluting the Earth, rampant injustice in the cobalt mining industry, and labor law violations in overseas tech factories, forcing tech companies to make products easier to repair (and therefore create less of a demand for more new products to be made) could do a lot of good. 
    • teresastas
       
      This is an important step in trying to eliminate e-waste but with technology moving and changing the way that it is I don't know if being able to do repairs or updates will make too much of a difference.
  •  
    This article addresses the French reparability index which is a relatively new implementation that started in January of 2021, It requires that reparability scores are posted on some major tech products in France in hopes of slowing down planned obsolescence and eliminating tech waste. France is the first country to implement such as mandate and it bringing to light the notion of planned obsolescence to the general public. This article shares some of the major tech brands scores and how they are fairing against their competition.
28More

What are the three big technology issues for the hotel industry? | PhocusWire - 0 views

  • The fragmented nature and location of hotel systems means a guest’s credit card number could exist in multiple systems in formats of varying security in locations of varying security.
    • kmira026
       
      1st technology issue for hotel industry
  • HTNG has set up a workgroup that will a framework that will enable hotels to concentrate the storage of sensitive card data in a single system, managed securely by a vendor or the hotel company.
    • kmira026
       
      Solution for 1st technology issue
    • nashalsiddiqi
       
      is this enough?
  • it has become critical for hotels to appear correctly and accurately in search results, as search engine sites have essentially become the gateway to travel research and inspiration.
    • kmira026
       
      2nd technology issue is Unique Global Identification Numbers. Something as small as a incorrect address can cause a problem
  • ...18 more annotations...
  • In both Europe and the US, regulations are being released and revised to provide support to guests with disabilities.
  • With the increase in electronic distribution of hotel information and transactions, hotels are working to provide better information and service to guests with disabilities.
    • torte003
       
      The three main technology issues hotels are facing are PCI, ID numbers , and support for best with disabilities.
    • torte003
       
      PCI is a main security threat that they face. Having a hotels cc system hacked and all their guest information stolen is an extreme nightmare. They have tasks forces that help educate hotels on how to protect and learn more about the procedures to keep that secure.
  • I can hear some of you now – what good can possibly come from creating an ‘association of associations’? Aren’t we just creating more overhead, more cost and more bureaucracy? In a word, no.
  • From my own perspective
  • I hate wasting our scarce
  • resources, and worse, wasting the resources of our members who volunteer their time to work for us
  • Other council member organization initiatives include a white paper authored by AH&LA, a payment technologies committee established by HEDNA, and the support by OpenTravel of needed XML specification changes as required by the industry.
  • thousands of companies worldwide provide hundreds of software applications to help hotels and hotel companies manage operations to provide better guest service.
  • three key technology issues that are having, and will continue to have, a direct strategic impact on the hospitality industry:
  • Search engine optimization is a great thin
  • PCI (payment card industry) complianceUnique identification numbers for hotelsSupport for guests with disabilities
  • ‘holy grail’
    • torte003
       
      Having wrong information about your hotel or business can be such a negative impact on business. With everyone now on google or yelp having the right information is crucial.
  • y company has become critically important for the financial stability and market credibility of the hospitality industry.Members of the HTSIC have addressed this issue in a coordinated
    • vanessavioli
       
      Cyber security is almost equal to climate change in the impact on the industry. As we move into being a cashless society, keeping guests information private is integral to the continued growth of the industry.
  • Initiatives specific to distribution include the creation of standard room definitions and descriptions, guaranteeing accessible guest rooms and removing the accessible guest room from inventory when booked. HEDNA has worked on creating this vocabulary, and OpenTravel has revised its hotel schema, annotations and code list to reflect these changes.
    • vanessavioli
       
      This is an extremely important issue for the industry. Creating an industry standard vocabulary to ensure that guests with disabilities receive the specific room and accommodations they need is a game-changer. The ease of mind that it would create for those customers is priceless.
  • And our biggest strength is our commitment to work together, to eliminate redundant work or conflicting positions, to be transparent and open in our dealings with each other, and to address the most important technological needs of the hospitality industry.
    • vanessavioli
       
      With the ease of current technology, concerns about many of the bureaucratic aspects of something like this can be quickly done or even potentially eliminated.
13More

What is Network Redundancy and Why Does It Matter? - 0 views

  • The underlying concept of redundant networks is simple. Without any backup systems in place, all it takes is one point of failure in a network to disrupt or bring down an entire system. Network redundancy is the process of adding additional instances of network devices and lines of communication to help ensure network availability and decrease the risk of failure along the critical data path.
  • All valuable data should be backed up regularly, preferably in another location. A good data center location strategy maps out the best places to replicate and store data so it can be easily accessed in the event that other redundant systems fail and the main network goes down. By using more than one data center, companies can ensure that even if some disaster occurs, they will be able to carry on with minimal disruption.
  • Colocation data centers regularly conduct tests to assess the integrity of their backup systems and redundant networks. They can test different connections by physically disconnecting hardware to make sure failover occurs as anticipated. If things do not go as planned during testing, data center managers then create an after-action report that lists the items they need to fix as a result of the testing. They also create a procedure to follow for both automatic and manual flip over. 
  • ...8 more annotations...
  • For many companies, their networks are the primary point of contact for delivering products and services to their customers.
  • A network outage, then, whether it's caused by equipment failure, an unexpected cyberattack, or some form of human error, can be devastating for a business. Every moment of system downtime translates into very real financial losses in the form of lost revenue, diminished brand reputation, and missed opportunities.
  • Network redundancy is the process of adding additional instances of network devices and lines of communication to help ensure network availability and decrease the risk of failure along the critical data path.
  • Without any backup systems in place, all it takes is one point of failure in a network to disrupt or bring down an entire system. Redundancy in networks helps to eliminate single points of failure to ensure better network stability and uptime in the face of events that would otherwise take the network offline.
  • fault-tolerant redundant system provides full hardware redundancy, mirroring applications across two or more identical systems that run in tandem.
  • Ideal for any operations in which any amount of downtime is unacceptable
  • A software-based redundant system, high availability uses clusters of servers that monitor one another and have failover protocols in place.
  • there is a brief loss of service while the backup servers boot up applications.
  •  
    Network redundancy is the process of adding network devices and other instances of communication lines to help ensure network availability and reduce the risk of failures on critical data paths. One of the first steps in the network redundancy plan is to create a network strategy that reviews the existing infrastructure. A high-quality hosted data center should have an extensive backup system to ensure that it is always available. All valuable data should be backed up regularly, preferably in another location. By using multiple data centers, companies can ensure that even if certain disasters occur, they will be able to proceed with minimal losses. In addition, a well-maintained UPS system ensures that the server can be switched from power to backup generator power without losing any data or applications.
  •  
    A network outage whether it is due to a cyber attack or simple human error can be devastating to a company. It makes them look very bad, damaging their reputation, and can cost the business millions of dollars. Network Redundancy can help ensure network availability and decrease the risk of failure. There are 2 forms of redundancy. Fault Tolerance where there is a mirrored backup system that takes over with no loss of service, and High Availability where the backup servers take over and restart applications that were running on the failed server.
21More

How Cloud Computing Helped Hotels and HotelTechReport.com Cope with Volatility | AWS fo... - 0 views

  • During the pandemic, the travel industry adopted technology at unprecedented speed and scope to meet new regulations and volatile market conditions.
  • At the heart of every hotel process or SOP there is software that relies on cloud computing.
  • received responses from 657 hoteliers that crystalized the major trends we’ve observed in the market:
  • ...17 more annotations...
  • cost savings is now actually less important to hoteliers than the ability to adapt to rapidly changing business conditions.
  • Historically, hoteliers respond that improving operational efficiency is the most important value proposition for adopting software, but when asked about their goal for hotel technology in 2021, hoteliers said they were adopting new technology solutions to assist in the transformation of business processes and operating models.
  • 96% told us that technology will be more important to their businesses in five years. 91% said that they expect to be using more software tools to run their businesses in 2025 than they did in 2020.
  • ocused on using technology to transform business processes after the events of 2020
  • Guests demanded fully contactless experiences for the first time in history.
  • detailed housekeeping protocols.
  • infrastructure and assets went unused
  • Hotels needed to decrease staffing levels while delivering increased, safety-focused levels of customer service.
  • Cloud computing technology like AWS has lowered the cost of delivery so that hotel operators of any size can access software that was previously only available to major global chains.
  • The cloud allows companies to avoid costly installations. It requires minimal upfront investment and frees up companies to focus on improving their core services instead of server configurations. The cloud also offers companies a pay-as-you-go model so that they can scale up and down their infrastructure in a flexible and cost-effective way.
  • Increasing server capacity without cloud servers would have required us to rush-order new servers. F
  • $5,000.
  • one additional server
  • able to double our server capacity for minimal cost.
  • It adapts to meet evolving business needs.
  • Sometimes they face growing pains and need to rapidly scale infrastructure to meet new demand.
  • hospitality ecosystem can use the cloud’s fundamental scale-up-on-demand model to enable creativity, innovation, and speed.
  •  
    After the pandemic hit in 2020, hotels have had to adapt to a volatile market quickly or risk major losses. This quick adaptation would not have been possible without cloud computing. Based on a Jan. 2021 survey, the vast majority of hoteliers now claim that the most important use of software is to have the ability to adapt to rapidly changing business conditions- a shift from the historical answer of efficiency and cost savings. What is clear is that without cloud computing, hotels would not be able to meet guests' evolving needs while navigating an ever- changing travel market.

Technology: Disruptive Innovation in the Tourism Industry - 0 views

started by lorenismora21 on 30 Aug 21 no follow-up yet
3More

PCI What? | Column | Hospitality Magazine (HT) - 1 views

  • I asked politely if the hotel was complaint with PCI Standards. "PC what?" she asked with a friendly smile.
  • PCI DSS, a business or organization should be able to assure its customers that their credit card data, account information and transaction information is safe from hackers or any malicious system intrusion (www.pcicomplianceguide.org). This includes physical copies of consumers' credit card information.
  • Extra attention should be paid to any wireless transactions. Wireless technology is considered the least secure by the PCI Council. Therefore, wireless hospitality applications that carry credit card information such as a wireless point of sale terminal should be evaluated very carefully

Cloud Computing: Travel and Tourism Trends - 0 views

started by lorenismora21 on 01 Sep 21 no follow-up yet
4More

PMS Software: What Are the Most Important Advantages? - Booking Ninjas - 1 views

  • A property management system (PMS) is a software application for the operation of hospitality businesses such as hotels and commercial or residential rental properties
  • PMS systems are customized for the needs of the hospitality industry to further increase ease of operations. Computer record keeping and PMS systems have increased the efficiency of hospitality industries significantly by making it possible to update and consult centralized records from multiple computers and devices.
  • According to Forbes, “Property managers have been using software to assist with managing their properties for years… Artificial Intelligence (AI) apps will just be a natural extension of this wave of adoption… they won’t replace current software solutions, they will compliment them.”
  •  
    The article discusses the importance of property management systems software and its most important advantages. It shows how important PMS is to your business financial health and the functions it performs to make you more efficient. The article also connects how Artificial Intelligence are a natural extension and will compliment the PMS software.
10More

3 Data Protection Tips for the Hospitality Industry | Endpoint Protector - 0 views

  • 1. Hire cybersecurity personnel
  • hospitality companies do need to acknowledge the need for cybersecurity personnel and hire a team that can keep their cybersecurity framework up to date and react in real-time to any security incidents that may arise.
  • 2. Protect against insider threats
  • ...7 more annotations...
  • Whether through ignorance or malice, employees are often at the heart of data breaches.
  • Another way companies can protect against human error or insider threats is through strong data protection policies.
  • limiting access to sensitive data only to those employees who need it to perform their job functions and restricting the use of personal mobile phones or portable storage devices in the work place.
  • 3. Look into compliance
  • hospitality companies must ensure that they have a high level of data protection in place.
  • Companies must therefore look into where their customers come from and what data protection laws are in place in their countries of origin and ensure they can protect their sensitive data accordingly.
  • Abiding by these standards should ensure that hospitality companies are protected from most potential data breaches and can thus stay clear of any penalties that would otherwise come their way.
8More

Using Proximity-based Technology At Events - Eventeem - 0 views

  • Proximity-based technologies provide brands unique opportunities both to interact with customers and deliver content straight to their devices.
  • Proximity-based technology is the perfect way to add interactivity to a campaign, through both content delivery, as well as other, more campaign-specific methods.
  • Beacons act as geographic points, where a device which meets the appropriate criteria e.g.
  • ...4 more annotations...
  • This can range from a notification of deal offers, a tactic used by US supermarket giant Target in over 50 stores nationwide, to a small piece of content.
  • Sharing-based Loyalty Card:
  • A live Competition:
  • A “Second Screen” Experience:
  •  
    This article speaks about the tole of Proximity based technology in events. It covers the benefits it brings and how it can work for companies. They present great examples on how companies have successfully used this technology.
15More

Could wristbands turn festivals into games? - BBC News - 0 views

  • Wristbands have long been synonymous with music festivals, but what was once a simple, colourful loop of material now increasingly contains contactless technology. This allows music fans to pay for food, drinks or merchandise but festival directors are now taking the technology further, into the realm of "gameification".
  • Festival director Ben Robinson says it will allow visitors to check-in at stages, talks and stalls, creating a "mission log" they will be sent after the event, listing what they saw and giving further information.
  • Ultimately, he hopes to turn festivals into immersive gaming sites - something akin to Pokemon Go - where, alongside enjoying the festival site, visitors can unlock exclusive rewards. This might include entry to a restricted area for visiting a number of check-in points or free dishes if enough food is purchased.
  • ...11 more annotations...
  • linking the wristbands to interactive apps and existing technologies, such as augmented reality, to give attendees something beyond the usual festival experience.
  • which is also used in contactless bank card payments,
  • The danger is that you get analysis that tells you 80% of your audience went to see Band X so you should book loads of bands that sound like Band X," he says
  • data can stop exposing you to that thrill of hearing something new and different."
  • "It's simply a device that will tell us how many people bought how many beers and at what time and such like [which is] data that a standard EPOS (electronic point of sale) system would track."
  • and experts also question the security of the system.
  • so somebody could duplicate it - and as it's contactless, you only need to be within a certain proximity.
  • "Also, the visitors are potentially being profiled and this is viewed by the security community as an invasion of privacy."
  • The system they are using provides only "blind data", he says, which means there is "no GPRS [and] no tracking"
  • "That is where people load money on that they never end up redeeming. Most retailers view this as an excellent stream of effectively free money... but it is scamming the punters who are already paying an on-site premium."
  • He says they use "a global encryption standard used by the military... that has only ever been hacked or cloned in a theoretical situation, never in real life" and only use any data collected for "assisting visitors with customer service enquiries".
  •  
    This article explains how music festivals are innovating their use of the RFID bracelets to create a more immersive guest experience. These bands, on top of being used as a cashless payment system, entry pass, and VIP entrance, festivals are now looking to use these bands to in creative ways including linking them to apps and augmented realty technologies to "gameify" the experience. Possibilities include having check- in sites to collect points for real- life prizes, allowing entrance to specialized areas, and creating mission logs so guests can remember their experience.
26More

100 Event Statistics (2021 Edition) - 0 views

  • Whether the industry remembers it as a catalyst or catastrophe will largely depend on how event professionals adapt and navigate the uncertain times to come.
  • Streaming experiences can reduce total climate pollution from events by 60-98%
  • 58% to 67% of eventprofs are very likely or completely likely to address sustainability in their meeting plans for 2021.
  • ...22 more annotations...
  • EVENT INDUSTRY CORONAVIRUS RECOVERY STATISTICS
  • 66.5% of eventprofs plan to use hybrid as their go-to format once in-person events resume.
  • Almost three quarters of planners (71%) plan to continue to employ a digital strategy to maintain their virtual audience once they return to physical events
  • 57% of attendees believe that they can conduct the majority of their event objectives online.
  • As of March 2020, the exhibition and events industry had lost 14.4 billion euros (16.5 billion USD).
  • only 5% were minimally impacted.
  • Almost three fourths of planners, or 73.6 %, have become more proficient or much more proficient in tech as a result of the pandemic, which will be important as the industry transitions further to virtual and eventually hybrid events in the coming months.
  • 39% of planners expected to be able to recoup at least 25 percent of their revenue by pivoting to virtual events in 2020.
  • Event planners listed social media as the most effective tool for event marketing (74%), followed by email marketing (66%), their website (60%) and event registration site (26%).
  • 37% of event planners report that social media exposure is a key metric of event success.
  • 58% of marketers use social media for marketing before, during and after their events.
  • 52% of events engage on social media several times a day.
  • 92% of marketers consider influencer marketing is an effective form of marketing, and  82% believe that the quality of customers from influencer marketing campaigns is better than from other forms of marketing
  • The most-used event app feature is agenda/sessions, used by 98.3% of eventprofs, followed by the sponsors/exhibitors listing (93%) and the speakers listing (89.3%).
  • 57% of app providers include recommendations of nearby places, events, and experiences to attendees, while 65% include personalized session or content recommendations
  • The average maximum price of an event app is $15,000, which is up substantially from average maximum price in 2019 of $9,600. (EventMB, 2020)
  • Most app companies (41%) charge according to features — the number of companies charging by number of attendees decreased by 9 percentage points in 2020, from 30% in 2019 to about 21% in 2020.
  • The most important consideration in event management software is support (79%), followed by the features (78%) and analytics (69%). Value for money is listed by 67% of event planners and for 58% it is important that they are not limited in terms of the number of events or attendees. (EventMB, 2018) Graph available. 18.8% of event planners used different event technology providers rather than an all-in-one solution in 2019, though the pivot to virtual events in 2020 has likely radically changed this.
  • In terms of sponsorship opportunities, the top three features offered by virtual event tech providers are sponsor/exhibitor profiles (78%), analytics/reporting (77%), and banners in high traffic areas (70%).
  • Only 14.5 percent of event planning companies experienced no impact from the pandemic.
  • Networking is the most effective strategy for event planners to find new clients (66%), followed by social media (45%).
  • 37% of planners value safety standards above all else when it comes to choosing a destination for their next event. The same criterion for venues ranked as most important for 56% of planners. This suggests planners expect venues to carry more weight than destinations when it comes to safeguarding their attendees.
  •  
    Informative page reflecting Event Statistics - Post-Covid
10More

GoTab Unveils Next-Generation All-in-One POS for Restaurant Operators | - 0 views

  • GoTab restaurant POS was designed to help operators adapt to changing consumer preferences while still creating a personal connection with guests.
  • With QR code ordering, guests enjoy having control over the ordering and payment experience, choosing to order what they want, whenever they want.
  • operators can now easily tailor a guest-initiated experience or a server-initiated experience, enabling both parties to start and access the ordering tab and giving everyone flexibility to place orders however they wish.
  • ...6 more annotations...
  • “GoTab has been a boon for us, helping us reduce labor and track financials and inventory,”
  • With the GoTab POS, front-of-house staff can handle the very first impression of guests’ on-site experience, which always makes or breaks the overall experience. Servers and managers can start and add to a digital tab, seamlessly pass the tab to guests, and then update it later with upsells or order changes.
  • servers can be proactive and anticipate guests’ needs with more table touches, more upsells, and real-time issue resolution.
  • GoTab allows operators to capture each guest’s preferences and build upon each guest’s ordering data to create loyalty programs and better market to customers
  • “The typical legacy POS system (at best) is going to capture the person paying for a check. In a traditional restaurant – let’s say you have a table of 4, a restaurant is lucky if they can capture a single diner’s data for loyalty, spending insights and marketing purposes.
  • GoTab’s technology also provides restaurants with a menu of solutions that can adapt to a wide variety of restaurant needs. For instance, operators might want to start with online food ordering capabilities or a standalone food takeout and delivery system which integrates to their existing point of sale system. When they later decide to upgrade to a full GoTab POS, they have a platform with functions that seamlessly communicate with one another and provide a full 360-degree approach to restaurant operations.
  •  
    The GoTab Restaurant POS is making waves in the industry that is coupling line level efficiency with increase guest satisfaction and preference catering to better assist guests throughout their dining experience. The new POS allows both guests and restaurant staff to add to a tab and reduces the overall time servers spend at a table being an order taker and thus frees up their time to allow them to better connect with guests on a personal level and fix issues in the moment that require more attention. The GoTab POS is going to be directly competing in an already saturated market filled with market leaders such as Square and Clover but I believe thier systems offer such a significant difference to the traditional POS system that they may be able to gain a competitive edge within the market.
6More

Managing Payments: How Embedded Fintech will Fuel Travel Revenues | PaymentsJournal - 2 views

  • These companies’ payments systems provide greater efficiencies for hotel owners, such as contactless payment and seamless accounting; they also provide financial services capabilities to owners and banks via embedded finance.
  • Embedded fintech is technology that enables embedded finance, into a financial institutions’ product sets, websites, mobile applications, and business processes via APIs by allowing banks access to a new customer base
  • To meet the demands of travel in a reopening world, these payment systems should also include a state-of-the-art terminal, transparent fees, built-in reporting, analytics, security, and world-class (in-house) support so hoteliers can to focus on their guests rather than time-consuming payments acceptance and reconciliation.
  • ...2 more annotations...
  • Further, cloud based payments systems are often integrated in Property Management Systems, (PMS)
  • Discover and seamlessly connect to 3rd party apps and services and a channel manager to sync rates, availability and details across 100s of channelsManage revenue by optimizing rates, tracking competitors, and providing insights & analytics,Connect to a booking engine to drive commission free bookings and the payment system, which alleviates manual credit card entry, lengthy verification processes and seamlessly rolls up accounting and tax preparation.
  •  
    FinTech is a hot topic and this Journal article touches on the developments of FInTech in the hotel. The standout line touches on how cloud payments can, "connect to a booking engine to drive commission-free bookings and the payment system..."
8More

Proximity Marketing: What is it? What types? - 0 views

  • Proximity marketing is any system that utilizes location technologies to directly communicate with customers via their portable devices.
  • distribution of media at concerts, information, gaming, and social applications, retail check-ins, payment gateways, and local advertising.
  • utilizing a number of different methods
  • ...4 more annotations...
  • Proximity Marketing Doesn’t Always Require Expensive Apps and Geocentric Technology
  • display signage
  • offer a free wifi hotspot.
  • our company website to detect people using a Mobile Browser at your location. You can then
  •  
    This article discusses what is proximity marketing is used for and the different ways it can be done. The article then also goes to highlight its importance as to why ot should be implemented.
11More

Cloud Computing Trends & Future Technology 2021 | Datamation - 1 views

  • Enterprise leaders are quickly recognizing that not all clouds work for all of their needs, and some of their legacy systems and applications work better on their existing on-premises infrastructure. These realizations, and a growing need for both flexibility and reliable security, have ushered in a period of growth for hybrid and multicloud setups. 
  • which polled more than 2,600 global IT decision-makers globally – and highlighted that hybrid cloud is now the most common choice, with 46% of respondents now using a hybrid cloud (a 12% increase since their previous survey).
  • Instead of relying on embedded, native security features, tech experts are advocating for the increased use of managed security service providers (MSSPs) and a better organizational policy for user access management. Organizations are recognizing that security incidents can come from both internal accidents and external actors, so it’s important that all users are trained and compliant with an organization’s security policies.
  • ...7 more annotations...
  • By implementing the ZTNA model for secure network access, IT teams can have full control over who is granted access, enters, and leaves the network at all times. This model has gained much more recognition since being mandated in President Biden’s executive order.”
  • The entire world is starting to shift its attention to Kubernetes and the orchestration of containers,” Cusimano said. “It’s the next iterative shift — we went from physical to virtual to cloud, and now we’re going to microservices and containers. 
  • “Cloud-native technologies will also lead and help companies to build, migrate, and modernize customer-facing and analytics and artificial intelligence (AI) apps more easily and at scale.”
  • cloud is typically more energy efficient than on-premises infrastructure, the growth of AI and the Internet of Things (IoT) is causing cloud technology to work harder than ever.
  • “Sustainability is a massive trend in IT – from enterprises seeking to ensure cloud providers leverage renewable energy in data centers to enterprises increasingly seeking to minimize their own supply carbon footprint via sustainably sourced, circular IT solutions,” Fenn said.
  • Although few cloud vendors have adopted the circular model, most are changing their business models to emphasize more renewable energy use, carbon offsets, and data center efficiency boosts.
    • cingram21
       
      This article discussed the five major trends and developments in cloud computing. The first point explains how there was a big trend towards cloud-only computing and away from on-premise infrastructure. We are realizing this isn't always the the best scenario and that a hybrid model allows for an enterprise to operate data-intensive processes while taking advantage of tech advancements associated with cloud computing. The second trend is utilizing "managed security service providers (MSSPs). This is because security is important to control both internally and externally. It also mentions "Zero-Trust Network Access" as a new executive order issued by President Biden. The third section discusses Kubernetes (Further research explained this is an open-source system for automating deployment, scaling, and management of containerized applications.) Kubernetes is also known as "K8s." This is a large shift from physical on-site infrastructure to "containers." This is packaging software for the deployment and the sharing of technology. The reason this is a trend is because it is cost-effective and improves performance. The final major trend is sustainability efforts. Cloud technology is more energy-efficient than on-site infrastructure, but advancements in (IoT) is causing significant growth and use of cloud tech which requires increased energy consumption. Cloud vendors are changing to ensure they are using renewable energy, carbon offsets, and data center efficiency. The most interesting part of this to me is the Kubernetes and Containerization as I have yet to read or hear anything about this. Open source is always interesting. The story behind K8's being developed by Google and now an independent foundation is good for our society and a good trend.
    • cingram21
       
      This article discussed the five major trends and developments in cloud computing. The first point explains how there was a big trend towards cloud-only computing and away from on-premise infrastructure. We are realizing this isn't always the the best scenario and that a hybrid model allows for an enterprise to operate data-intensive processes while taking advantage of tech advancements associated with cloud computing. The second trend is utilizing "managed security service providers (MSSPs). This is because security is important to control both internally and externally. It also mentions "Zero-Trust Network Access" as a new executive order issued by President Biden. The third section discusses Kubernetes (Further research explained this is an open-source system for automating deployment, scaling, and management of containerized applications.) Kubernetes is also known as "K8s." This is a large shift from physical on-site infrastructure to "containers." This is packaging software for the deployment and the sharing of technology. The reason this is a trend is because it is cost-effective and improves performance. The final major trend is sustainability efforts. Cloud technology is more energy-efficient than on-site infrastructure, but advancements in (IoT) is causing significant growth and use of cloud tech which requires increased energy consumption. Cloud vendors are changing to ensure they are using renewable energy, carbon offsets, and data center efficiency. The most interesting part of this to me is the Kubernetes and Containerization as I have yet to read or hear anything about this. Open source is always interesting. The story behind K8's being developed by Google and now an independent foundation is good for our society and a good trend.
1More

How to choose the right hotel software from reliable vendor | By Bogdan Romashko - Hosp... - 0 views

  •  
    The article, "How to choose the right hotel software from reliable vendor", by Bogdan Romashko, discusses the steps needed to successfully select the correct Hotel Management Software for the respective property. The two emphasized points in the article of finding a software are to ensure that the selected software fits the type of hotel in operation and analyzing the original business model to properly select the correct PMS. The selection of the PMS is difficult due to the variations of properties and must be carefully analyzed. A variable, such as the property size and location, can change the PMS used for a particular property. A hotel in Los Angeles, California has different needs than a hotel in Cody, Wyoming. The clientele is different and the operations software needed are unique to that clientele. In addition, the business models for each location has slight difference when calculating success and monitoring customer activity. The PMS selected will basically do the same thing regardless of the property including, financials, task, and logistical management. Lastly, PMS technology can be utilized to assist during the pandemic with minimal touch capabilities which are keyless entry and online check-in and -out.
15More

10 Jaw-Dropping Event Marketing Stats That Point to the Future of the Industry - Endles... - 0 views

  • November 2, 2017
  • In fact, it’s the intersection of digital marketing and event marketing that makes the latter as effective as it is.
  • They are absolutely critical for outpacing and outlasting competitors.
  • ...11 more annotations...
  • To paraphrase the mantra of the Instagram era: “Events or it didn’t happen.”
  • Businesses invested heavily in the online world, but a response from consumers was inevitable.
  • advertisers have to fight tooth and claw with one another to be noticed.
  • Every minute 3.8 million Google searches are made, 1,440 blog posts are published and nearly 150,000 emails are sent.
  • The ability to track, attribute and analyze event ROI just wasn’t there before.
  • be it attendee engagement, contacts management or marketing automation
  • Whereas 63% of all of the marketers surveyed said that they plan on investing more in live events in the years to come, 80% of marketers from organizations that are overperforming in regards to their business goals plan on investing more in events.
  • “Live events are a great way for generating leads, if your annual contract for a client is large enough. If you’re selling 10 dollar stuff it’s not worth it, a way to primarily generate leads. Otherwise, it’s a great opportunity engage your community and to build products, to understand what your community cares about. Because as a business you should always be talking to your customers.”
  • In fact, 80% of marketers plan on investing more in event technology and they plan on doing so with thousands of more dollars than marketers from organizations that are underperforming or performing as expected.  
  • The combination of both the modern CRM and the modern marketing automation system has given rise to the modern event management platform, which enables marketers to manage, measure and grow their events like never before.
  • One of the biggest obstacles for organizations in the past was accurately attributing and measuring event ROI
  •  
    Statistics re: the use of tech in events and its importance/future
25More

How the travel industry can fight back against cyberthreats | SmartBrief - 1 views

  • Travel and hospitality businesses have become lucrative targets in recent years for cybercriminals who have stolen from the industries in attacks that often take more than half a year to identify.
  • In the past three years alone, the hotel industry has faced 13 serious attacks, according to an IntSights study.
  • The travel and leisure sectors suffered a 155.9% year-over-year rise in suspected online fraud attempts worldwide in the second quarter, according to a TransUnion study, compared with a 16.5% increase in overall alleged intrusions.
  • ...21 more annotations...
  • The hotel industry attracts cybercriminals because it handles so many financial transactions in so many countries.
  • The top threat to hotels is phishing, a scam in which hotel guests may receive fake phone calls claiming to be from the front desk. The caller could claim that there is an issue with the credit card on file and that they need to re-verify the payment method. 
  • DarkHotel hacks are another significant threat. These target travelers via hotel Wi-Fi. Digital certificates are sent to guests, like a familiar adobe update, which will retrieve sensitive information. Hotel chains are combating these hacks by suggesting that guests use a virtual private network.
  • Malware (malicious software) is something criminals email employees, under the guise of the attachment or link looking innocent or legitimate. But when the user opens the file or clicks on the link, their system (and more) can be hacked into by the criminal.
  • IT department should routinely update operating systems and back up data and files, and every employee should double-check sources when asked for software administrative permissions. Also, strong firewalls can limit bad traffic and provide security. 
  • Software and hardware can help prevent breaches, but employee training is also an essential part of any hotel’s cybersecurity.
  • In 2018, a Marriott reservation system was hacked. More than 500 million customer records, including credit card information and passport numbers, were stolen. The company said the hack went back four years prior to the discovery and, when it was noticed, the company started using computer and mobile device monitoring software.
  • “Guests can enroll in a service called WebWatcher, which monitors the sites where personal information may be shared and alerts guests if evidence of their personal data is found,”
  • Hotels are not alone in being targeted by cybercriminals: The airline industry has faced serious cyberattacks as well, and many airlines still aren’t equipped to handle them.
  • only around 35% of airlines and 30% of airports are prepared for cyberattacks.
  • "The proliferated effect of the attack on SITA is yet another example of how vulnerable organizations can be solely on the basis of their connections to third-party vendors,"
  • The aviation industry faces dangers such as ransomware and distributed-denial-of-service attacks. Following the SITA attack, HackerOne solutions architect Shlomie Liberow stressed that airlines need to prepare for the worst. 
  • traditional enterprises like airlines have always been an attractive target since few are digital-first businesses, and therefore have relied on legacy software, which is more likely to be out-of-date or have existing vulnerabilities that can be exploited."
  • The airline industry needs to keep third-party vendors in check when it comes to protecting information. Given the high stakes involved, experts suggest that blind trust is not an option. 
  • “You simply cannot know whether your third parties meet your company’s security controls and risk appetite until you’ve completed a full vendor security assessment on them,
  • It’s important to note that the best practice is not a ‘one-and-done’ activity, but through real-time, continuous monitoring.”
  • In 2015, hackers targeted Polish airline LOT’s ground operations system, affecting 1,400 passengers. The hackers made it impossible to create flight plans and flights. It was the first attack of its kind, and it caused concern about cyberattacks one day remotely taking control of planes.
  • To address the threat, the standard advice is to back up and store data in multiple places, including off your physical premises, and have one copy of it be offline
  • Multifactor authentication and long, complicated passwords will take longer to crack. Updating and patching systems regularly helps companies avoid being victimized when a new exploit is discovered.
  • Treating cybersecurity as a companywide concern, not an IT concern, encourages each employee to take ownership of their actions and knowledge and to seek help proactively instead of making an “innocent” mistake that costs the company millions of dollars.
  • Finally, companies should avoid simply throwing money at the problem: Not all cybersecurity solutions work together, which wastes money and increases the risk of a breach.
  •  
    This article discusses ways that the travel industry can combat cyberthreats. The main cyber concern for hotels' is phishing, which is a scam that collects credit card information by pretending to be apart of a hotel's front desk staff. The article mentions that IT departments should do routinely updates to operating systems and back up data and files. Employees should also be trained to help prevent data breaches. The author briefly touched on what to do when your hotel system is hacked and even dives into how the airline industry is still very unequipped to handle cyberattacks and threats. This is a great read to learn how to keep up with best security practices in the hospitality and tourism industry.
« First ‹ Previous 2361 - 2380 of 2458 Next › Last »
Showing 20 items per page