Skip to main content

Home/ Hospitality Technology/ Group items matching "live" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
5More

Soaring e-waste affects the health of millions of children, WHO warns - 0 views

  • As many as 12.9 million women are working in the informal waste sector, which potentially exposes them to toxic e-waste and puts them and their unborn children at risk.Meanwhile more than 18 million children and adolescents, some as young as 5 years of age, are actively engaged in the informal industrial sector, of which waste processing is a sub-sector. Children are often engaged by parents or caregivers in e-waste recycling because their small hands are more dexterous than those of adults. Other children live, go to school and play near e-waste recycling centres where high levels of toxic chemicals, mostly lead and mercury, can damage their intellectual abilities 
  • For an expectant mother, exposure to toxic e-waste can affect the health and development of her unborn child for the rest of its life. Potential adverse health effects include negative birth outcomes, such as stillbirth and premature births, as well as low birth weight and length.  Exposure to lead from e-waste recycling activities has been associated with significantly reduced neonatal behavioural neurological assessment scores, increased rates of attention deficit/hyperactivity disorder (ADHD), behavioural problems, changes in child temperament, sensory integration difficulties, and reduced cognitive and language scores.
  • A rapidly escalating problem
  • ...1 more annotation...
  • The WHO Initiative on E-waste and Child Health, launched in 2013, aims to increase access to evidence, knowledge and awareness of the health impacts of e-waste; improve health sector capacity to manage and prevent risks, track progress and promote e-waste policies that better protect child health; and improve monitoring of exposure to e-waste and the facilitation of interventions that protect public health.
  •  
    This Article corresponds to the two discussion posts this week. where we see e-waste not only a growing problem for pollution but affecting the health of younger children in surrounding areas, this article discusses how the WHO is trying to bring awareness to this issue.
14More

Attacked by Ransomware, Many Companies Opt to Pay Up - CFO - 1 views

    • emmajeenie
       
      The demanded ransom is often a moderate amount that would pale in comparison to the recovery and reputational costs for a company that refuses to pay.
  • Hospitals, for instance, are frequent targets of these kinds of attacks, in part because people’s lives are on the line so they have to make quick decisions.
  • , in a ransomware attack the data isn’t released or leaked or sold. On the contrary, in most cases, data and infrastructure aren’t compromised at all; its owner just can’t access them.
  • ...11 more annotations...
  • y rose 41% from 2018 to 2019 to more than 205,000 globally, according to newly published data.
  • the security firm Coveware estimates the average payout for those that did was about $85,000 during last year’s fourth quarter, and more than $190,000 in December.
  • its leaders give in — and pay the ransom.
  • Organizations have more to lose financially from the inability to conduct business than they do from just paying the ransom
  • It’s like the plot of a James Bond movie: Hackers take control of a global organization’s computer systems and threaten to destroy its records, steal its intellectual property, and drain its bank accounts unless a hefty ransom is deposited into an untraceable offshore bank account by the end of the day.
  • ” the ransom is likely a significantly smaller amount than what it may cost to address a threatening public issue or the time and money necessary to rebuild the confidence in a brand or company.
  • Experts suspect that the actual number of ransomware attacks is much higher than the reported number, citing reasons ranging from fear of job loss, investor withdrawal, and reputational damage
  • Moreover, while public companies are required to report cyberattacks to regulators, private organizations are under no such mandate. Reporting attacks to law enforcement often may cause lengthy investigations
  • A hacker can keep repeating a ransomware attack until the security flaw is fixed or they are caught or reported.
  • Organizations can undertake a few basic defensive actions to mitigate the impact of a ransomware attack. Frequently backing up data and storing it on different networks is one way,
  • reducing the number of outside apps the system uses, fixing software vulnerabilities immediately, and properly training and educating employees on what to look for and whom to alert if something appears suspicious.

Hospitality/Tourism emerging software - 2 views

started by lclar060 on 15 Jan 20 no follow-up yet
12More

What you need to consider when choosing a new property management system - 0 views

  • An intuitive interface, as well as an easy-to-read dashboard, go a long way in encouraging employee adoption, reducing training time, and generally improving the working lives of yourself and your team
    • npate083
       
      PMS should be user-friendly so employees can adapt to it faster, reducing training time. It will also make the work easier for your team.
  • A great PMS is one that your team will want to use. Since “good” design is in the eye the beholder, search for a System that balances functionality with an interface that makes sense to you.  
  • GDPR-compliant personal data storage PCI-DSS-compliant processing and card storage Geographic diversity of servers to reduce downtime risk Bank-level encryption of all data Controlled access to the physical area for any on-premise PMS servers
  • ...5 more annotations...
  • robust user access controls
    • npate083
       
      A good PMS system should also have systems in place to maintain guest privacy and payment security.
  • PMS that molds itself to your business,
  • The right PMS is the one that plays well with your existing tech stack. Without the necessary integrations, a PMS cannot perform its functions correctly.
  • One of the reasons why integrations are so important is that a poorly integrated PMS impedes proper reporting
  • All budget certainly matters, it shouldn't be the first criteria. I
  •  
    The article overall discussed the the most necessary things one must observe when choosing a new PMS system. A PMS system must first of foremost be budget friendly. PMS system is the main software for a hotel so the cost is valued highly. Most companies would prefer a pms system that is cost efficient. A PMS system also needs to be easy to use, it must be able to be handle by employees and easy to read and maneuver. The PMS system must also be secure and have controlled access. It also needs to be able to mold to the hotels system.
  •  
    The article overall discussed the the most necessary things one must observe when choosing a new PMS system. A PMS system must first of foremost be budget friendly. PMS system is the main software for a hotel so the cost is valued highly. Most companies would prefer a pms system that is cost efficient. A PMS system also needs to be easy to use, it must be able to be handle by employees and easy to read and maneuver. The PMS system must also be secure and have controlled access. It also needs to be able to mold to the hotels system.
7More

Virtua Hospitality debuts online event platform | Hotel Management - 0 views

  • Virtua Hospitality launched UgoVirtual, an online platform designed to meet the virtual travel and event management/hosting needs of the global travel and hospitality sectors
  • UgoVirtual platform allows event organizers and meeting planners to virtualize a variety of even
  • , such as industry trade shows, corporate meetings and conferences
  • ...3 more annotations...
  • The flexible and highly configurable UgoVirtual platform can be used to host a standalone online event or alternatively, to augment an on-site event by creating a virtual version of it for remote attendance, participation and learning.
  • Virtual events are the future of our industry since they can be used to expand both the attendance and reach of on-site conferences and meetings. With the advancement of digitization, virtual concepts are poised to become the new reality for the hospitality and travel sector.”
  • Registered attendees can access the event via any internet-enabled desktop, tablet or device to visit various locations and participate in a range of activities, such as live keynotes and breakouts, on-demand sessions, 1:1 chat, social networking, peer collaboration and much more
  •  
    Virtua Hospitality launched UgoVirtual, an online platform which allows event organizer to virtualize many events. Registered attendees can access events via several devices and participate in many activities. As mentioned by Mike Blake, Virtual events is said to be the future of the industry.
20More

Meeting the Threat in 2019: Cybersecurity for the Hospitality Sector | Modern Restauran... - 0 views

  • With a reputation as less well guarded than similar institutions, hospitality companies are a popular target for cyberattacks.
  • Experts warn other hackers, like those working for a nation-state, could exploit hospitality breaches like Marriott’s to acquire details on the travel and spending habits of espionage targets, like CEOs and diplomats.
  • permeable security in the hospitality sector threatens consumer privacy, shareholder value, and national security.
  • ...15 more annotations...
  • many hospitality companies are reconsidering their cybersecurity infrastructure. However, industry specific challenges like high employee turnover continue to expose the sector.[6]Additionally, even by adopting cutting-edge cybersecurity technologies, the important question of strategic implementation remains.
  • Are newly introduced technologies simply bolstering traditional methods of cybersecurity, or are they being used for methods of cybersecurity that are new and innovative, instead of simply faster or more efficient versions of the same product?
  • Traditional cybersecurity approaches are focused on reporting about intrusions after the fact, in what is known as an “incident response.”
  • Regardless of how they gain access, once an attacker is discovered, the forensics about the attack, including basic information known as Indicators of Compromise (IOCs) like IP addresses, domain names, or malware hashes, are shared across the cybersecurity community. These IOCs are then used broadly to thwart future attacks. 
  • The problems with this approach are twofold:
  • someone has to be a victim first so that IOCs can be derived and shared with others; additionally, blocking IOCs has a very short half-life.
  • All an adversary has to do is come from a new IP address or recompile their malware so that it has a new hash value (both of which are extremely trivial) and their attacks will sail through defenses that depend on IOCs.
  • As hackers repeatedly gain access to valuable systems and data using the same methods, cybersecurity teams continue to chase after them to secure compromised systems.
  • Very little cybersecurity effort is put towards addressing the methods used by adversaries; instead, security teams are locked in a pattern of waiting for inevitable attacks, trying to minimize the damage they cause, ensuring that remediation occurs as quickly as possible, and blocking only exactly identical attacks.
  • Incident response only helps prevent attacks that exactly replicate past ones.
  • a more proactive, sophisticated approach is needed. It will need to be designed to successfully recognize adversary methodology (and all the manners in which an adversary attempts to obfuscate their methodology) before attacks occur and at a meaningful scale.
  • Instead of seeking discrete, static IoCs based solely on what has already occurred, proactive cybersecurity analysts can instead use the intelligence they have derived about adversaries’ methodologies – commonly referred to as tactics, techniques, and procedures (TTP). 
  • From these TTPs, analysts can identify the general form and components of an adversary campaign. In addition, they can determine abstract indicators like how the adversary is attempting to hide his actions. 
  •  A proactive cybersecurity tool would be able to recognize possible adversary TTPs and indicators that describe a threat (or threatening behavior) in general terms. The system would then act on any traffic which met this pattern before it reaches inside a network, as the attack occurs, and do so in a way invisible to adversaries.
  • Using this basic model, a cybersecurity tool could truly prevent common exploits before they were executed, and could even predict and protect against future, not yet seen exploits.
  •  
    In the wake of the Marriott International cyberattack, the article presents the issues with the current issues in the methodology of cybersecurity; first explaining the data of how popular they are in the hospitality industry, and what it means for the industry, before going into the process of how a cyberattack happens and the measures taken to prevent it. Traditional cybersecurity is one of an "incident response" which can only be implemented once a cyberattack occurs and can only prevent it temporarily as a hacker can do similar tasks with different IP addresses and new malware. In order to circumvent this failure of cybersecurity, the article offers a new method in which TTPs (tactics, techniques, and procedures), are used to identify certain components of a hacker and identify how they would carry out an attack, before acting on it before the attack would "reach the network".
  •  
    This article discusses one of the largest fears of most hospitality firms, and that is keeping their client's personal information private. Most large companies in this industry have become giant data centers for the personal information of millions of people. Breaches of this type of information place the lives of many people at stake. For example, Marriott International had a security breach of over half a billion of its clients which began in 2014 and was not detected until September of this year. Keeping an individual's information away from malignant forces is just plain business sense and any more attacks of this manner will severely hurt the reputation of the business experiencing it.
9More

(PDF) THE IMPLEMENTATION OF E-MARKETING IN THE HOTEL INDUSTRY: THE CASE OF ISTRIA COUNTY - 0 views

  • e research was conducted using a survey method. e research results show that hotel companies in Istria County have achieved a medium or even high level of implementation of e-marketing practice. e companies with a higher level of e-marketing practice also achieve better business performance. However, the survey also revealed the constraints to the widespread application of e-marketing in the hotel industry.
  • e increasing presence of the Internet in daily lives has resulted in the Internet an essential media in marketing communication.
  • To gain competitive advantage in the demanding tourist market, it is important nowadays for a hotel company to have its own website, promote its products through social networks and mobile applications, use e-mail as a channel of communication with its business partners and customers, and apply all available information-communication technology (ICT).
  • ...5 more annotations...
  • Some authors emphasize the role of the Internet in the application of e-marketing, while others perceive that term broadly, including the application of other ICT solutions.
  • consider the concept of e-marketing as a means of moving products or services from producers to tourists, and using the Internet as a means of promotion and a sales channel.
  • the use of electronic data and applications for planning and executing the conception, distribution and pricing of ideas, goods and services to create exchanges that satisfy individual and organizational goal
  • Internet marketing, e-mail marketing, mobile marketing, intranet marketing and extranet
  • marketing, as well as dierent e-marketing forms
  •  
    This article is actually based on a case study on the implementation of e-marketing in the hotel industry. This article examines the level of implementation of e-marketing practice in the hotel industry. It is an empirical research article conducted in Istria County, the most developed tourist county in Croatia.
3More

Eventbrite: Fundamentals Are Improving, But Higher Growth Is Needed - Eventbrite, Inc. ... - 0 views

  • Eventbrite operates an online platform which facilitates the planning, promotion, and production of a broad range of live events such as fundraisers, seminars, wellness activities, music festivals and classes
  • able to attract creators to their platform through a number means, including prior experience as attendees, word of mouth, internet search and their large library of content which helps to limit customer acquisition costs.
  •  
    This article explained what Eventbrite is and how it is a strong event management platform.
14More

6 Event Trends You Need to Know for 2019 | ITA Group - 0 views

  • ways to engage attendees differently and encourage innovation and creativity
  • A great way to start is by changing up the facilitation or presentation style
  • some unexpected venues
  • ...10 more annotations...
  • Private lofts and businesses are starting to rent areas that would previously have been off-limits, which makes attendees feel like they’re getting exclusive access.
  • he popularity of eSports events is influencing event connections.
  • Create policies outlining inappropriate behavior,
  • se of voice and facial recognition will increase and will improve overall experience and engagement.
  • dding areas or just time where attendees can unplug from the event and allow them to process what is happening and reconnect, allows them to come back energized and engaged.
  • Many companies’ risk management plans cover terrorism and communicable illness, but more than ever, tech security and sexual harassment policies need to be included as well
  • 61% say they go to live events and tournaments to connect with friends they’ve met and play with online, and 41% said they attend to forge new relationships.
  • hannels to report issues, and protocol for staff on how to deal with allegations.
  • With the increase in vegan and healthier diets, there is an influx in looking for new ways of clean eating.
  • increase their sustainable operations.
  •  
    In this article the writer mentions different trends and solutions to common situations on the event industry. From sustainability all the way to methodologies to avoid sexual harassment.

The Benefits of Incorporating Live Plants for Hospitality Industry - 0 views

started by keugent on 06 Nov 19 no follow-up yet

A 5-star POS that saves money & drives revenue - 0 views

started by keugent on 20 Nov 19 no follow-up yet
9More

What Employees Expect from Their Human Resource Information Systems | HR Technologist - 0 views

  • we often see employees complain about using these systems, citing reasons such as a slow system or the excessive time taken to learn how to use it.
  • After all, if employees do not adopt and embrace the HR systems to make their work easier and faster, what is the use of investing millions in expensive HRIS?  
  • As an HR, get into the mind of the employee while planning to design an HRIS
  • ...5 more annotations...
  • HR must aim to replicate the flexibility, speed, and convenience of the personal app, making enterprise applications highly intuitive and usable for the employee.
  • Some of the things that millennials expect from their work interactions are instant feedback and responses, clean user interfaces, and information at the tip of their fingers when they need it the most.
  • Today employees work on the move, often from remote locations for days together. Lack of access is a handicap that hampers effective work. Always-accessible employee service systems are non-negotiable.
  • employees must feel that the HRIS adds value to their work lives, and not a burden to be “finished off”.
  • Only when the HR professional puts himself or herself in the shoes of the employee, will he or she be able to truly understand what employees expect from the organization.
  •  
    The article discussed how three main things are expected from a fully functional Human Resource Information System. Employees expect the system to be easy to use, desired, and easy to access. The author believes that the employer has to place themselves in the employees shoes in order to design a HRIS that is fully functional and extremely useful to an employee if they are unable to do this then the system would be of no purpose to the employees.
11More

Rakuten's CEO on Humanizing E-Commerce: Discovery Service for FIU Libraries. - 3 views

  • Amazon and many other companies. I think of those competitors as vending machines: They are hyper-efficient supermarkets with standardized offerings
  • If you go to a supermarket or a McDonald's in Japan, you'll find an extremely high level of hospitality and customer service -- in contrast to the atmosphere in most Western markets, where customers are much more focused on speed and convenience.
  • Today Rakuten is the world's third-largest marketplace for e-commerce, behind Amazon and eBay.
  • ...6 more annotations...
  • I'd learned that it doesn't matter how big your employer is -- what matters is how much value you yourself create. This view is the opposite of how success is seen in Japan, and my family was shocked when I said I was leaving my job in banking.
  • Rakuten merchants sell more than 10% of all the wine sold in Japan. They sell cars. They sell a lot of art. Recently they've started selling houses. Food is a really big category, even though nobody believed when we launched that food would become a mail-order business. Expensive chocolates are a very large category on Rakuten, and so is clothing -- 70% to 80% of what I wear most days was bought on the site.
  • When people talk about "social shopping" or "social commerce," they're referring to the fact that people like to connect with others for advice about purchases.
  • One potential downside of offering a decentralized marketplace with goods from thousands of merchants is that quality or service problems may occur. But Rakuten has found ways to avoid this. We have a tight screening process for people who want to open a store on our site. We monitor transactions. We have a survey program that allows customers to give feedback on shops, and if a shop consistently receives poor ratings and cannot improve, we'll kick it out. If goods don't arrive, we offer a refund.
  • ravel websites in Japan are quite different. They're set up so that hotels can edit their pages themselves and tell their own stories. That allows the hotels to make a connection with customers.
  • Mikitani believes that human beings need communication and connection. So instead of emphasizing efficiency and convenience, Rakuten tries to create a personalized, bazaarlike shopping experience.
  •  
    The article discusses how a service-based approach to e-commerce has tremendous value. The article focus on how Rakuten choose to infuse hospitality services, normally reserved for brick & mortar establishments on internet based business. Affording them the opportunity to generate profits by having access to this type of infrastructure at a fraction of the cost than if delivered in a traditional format.
  •  
    I enjoyed reading this article and learning more about Rakuten. Their business approach seems valuable particularly for the culture it serves. Being that he is familiar with Japanese culture and their preference for an interpersonal approach, Hiroshi Mikitani the CEO of Rakuten was able to veer from the norm of a standardized and process-oriented approach and build a successful business. Rakuten platform allows allows hotels to set up so they can edit their pages themselves and tell their own stories, which allows the hotels to make a connection with customers.
1More

Hospitality/ Tourism software improvements to come. - 0 views

  •  
    Undoubtedly, the world we now live in will continue to evolve with emerging technology and software. In fact, businesses will incorporate more user-friendly features like speech recognition tables at restaurants and virtual tours of rooms. The hospitality market will be more competitive in the future with advancements in technology but also more personalized for customer experiences.
11More

The Evolution of Cybersecurity Threats During COVID-19 and What You Can Do About It | U... - 0 views

  • As the COVID-19 pandemic spread across the globe, the risk for cyber-enabled fraud exploded in unparalleled scale and scope
    • yvenisem
       
      ill-prepared companies and much more opportunity for hackers
  • Cybercriminals have taken advantage of this ‘new normal’ and have been exploiting cyber vulnerabilities among businesses.
    • yvenisem
       
      Since a lot of things have been moved online to promote spcial distancing, it only makes sense.
  • COVID-19 has changed many aspects of our lives—working from home, virtual meetings, and digital commerce are becoming our new normal
    • yvenisem
       
      Zoom is a huge part of this, imagine holding a very confidential meeting and it being intercepted by unauthorized peoples
  • ...2 more annotations...
  • 48,000 hits on malicious URLs, and 737 pieces of malware detected—all tailored with content relevant to COVID-19.
    • yvenisem
       
      It's become so much easier to prey on people who just don't know and are not aware of certain risks
  • They exploit our trust. The trust we have in the applications we use, the emails that we get,”
    • yvenisem
       
      This reminds me of a time I got an email that seemed like it was from my job, fortunately, i opened it from home rather than on the company network
  •  
    This article seeks to make people and businesses aware of the threats that have risen due to covid-19. Now that people are away from their desks, their guard is down. However, they can still be connected to the network, making them especially vulnerable to attacks. Not only this, but when it comes to Zoom meetings, they can be intercepted by hackers, leaving the attendees unaware.
20More

Corporate travel distribution is broken - now some blame the GDSs | PhocusWire - 0 views

  • , NDC and retailing in the corporate space is the simplification of the traveler’s experience.
  • the traveler buys their fare here, their bag there. Why can’t that all be wrapped up in one bundle and sold at the point of sale for the corporate traveler
  • “It eliminates expense report nightmares
  • ...16 more annotations...
  • The consensus among panelists was that the GDSs have been slow to advance the technology needed to help airlines achieve their distribution goals with NDC.
  • h a gun to their head.
  • customers simply want access to content
  • Our role is to use our size and influence to talk to GDSs, get them to the table, to airlines about how do we move forward.
  • The distribution model is broken, and airlines are signing GDS contracts pretty much with a gun to their head, and I don’t think that’s a healthy or sustainable way
  • But the longer we cling to this old model that’s been around forever and doesn’t work
  • The distribution model is broken, and airlines are signing GDS contracts pretty much wit
  • They’ve been very slow to advance their technology. When NDC becomes a commercial issue, that’s not what [NDC] is
  • GDSs are realizing, you better catch up or you’re going to be in trouble.”
  • has been slow to meet the needs of the end traveler, and it’s up to those in the industry to scrutinize whatever is blocking that path.
  • the GDS doesn’t acknowledge products, it’s hard to build.
  • The customer is suffering. There are products created for their benefit they cannot see and cannot buy
  • It’s not just about shopping, not just about selection
  • “We have to do it in a way where the whole process can be effectively managed for the traveler/buyer. Different suppliers are going at different paces. What we don’t want is an inconsistent experience for the end custom
  • With airlines having different capabilities and services and moving at different speeds, and the GDS having to do individual implementation for each, it becomes more complicated.
  • You did shit across the last decade. The GDS playbook for the past 10 years was, ‘What if we sit here and do nothing and see if it goes away?’ Now airlines have some success, and now your hand is forced. You had ample time to do it
  •  
    the article highlights the expectations of the airlines and travel management companies from the GDS system and showcase what kind modifications can be made to better the service.
10More

Recent Trends in Event Management - 1 views

  • Recent Trends in Event Management
  • meetings and events this year is the introduction of Smartphone technology to business.
  • Through the use of various mobile applications for event management, it becomes easier for the event managers and the producers to promote audience engagement, interactivity, and business-to-customer networking.
  • ...5 more annotations...
  • “Technological advances continue to be increasingly important and are leading to more requests for customization and interactivity in meetings and events…We expect technology to be at the core of several trends in the meetings industry in 2011."
  • Publicis Meetings USA (PMUSA), revealed that the trend of using technology in meeting or event management will drive in forward, thanks to the increasing tech-savvy clients.
  • Today the trend of using mobile applications for event management has led the Smartphones to increase the technological and interactive aspects of a meeting or an event. There are various audience response and networking apps that helps in accomplishing tasks like customizing program agendas, and messaging.
  • The entrepreneurs and event managers have a coined the term “hybrid meetings” for the type of event management that comprises both the elements of a live meeting and a conference via the Internet.
  • With the use of applications like the Windows mobile apps, your Smartphone can be transformed into a hand-held PC.
  •  
    This article is an interesting one, highlighting the changes in trends in Event Management. The article starts off by explaining that the major changes in the meeting and planning areas of a business is due to the introduction of the smartphone technology in the business. It goes on the explain that there are mobile applications used just for events. It seems that the more that people and businesses become aware of the use of the mobile device as it relates to technology, it will make it even easier to customize and request different things for an event. Technology will be the core to different and new trends in the meeting and planning areas of businesses. It evident that the use of different mobile applications will make every thing easier for event managers. It allows managers to communicate with their customers and understand what exactly it is they need.
  •  
    This article looks at the rising use of Smartphones and smartphone apps for the event planning industry, and more specifically at industry meetings. The use of the technology makes it easier to connect the audience on points like engagement, interactivity, and business-to-customer- networking. As the importance of social media interaction in business, so does the need for interaction between business leaders increase as well, and helps to create a successful marketing event.
18More

Meeting Planners Are Struggling With the Fast Evolution of Event Technology - Skift - 1 views

  • Meeting Planners Are Struggling With the Fast Evolution of Event Technology – Skift
    • rnobl005
       
      Skift posted this article almost a year ago but I felt like it was still applicable today. It definitely speaks to this week's subject of integrating IT into a business and the time invested. Event related technological solutions have boomed in recent years but this article finds that meeting planners are having trouble navigating cloud-based event management platforms like Cvent. I actually had personal experience with this in my previous role - I was on the receiving end of the RFP meaning planners would want me to generate quotes for them. Unfortunately our venue didn't have consistent pricing rates so I would have to personally contact the requestor to learn more about their event, which defeats the purpose of the software. Eventually we just stopped using the system altogether but couldn't figure out who to speak with at Cvent to close our account - so to some planners it appeared as though we were flat out ignoring their business. What I found interesting about this article is that those planners also had issues with the system, specifically with the lack of clarity and poor response rates. Another point of contention is that planners are using technology post-event to measure ROI, but they are having a lot of trouble implementing this data to make future programming better. Mike Mason, VP of sourcing and hospitality solutions with etouches (another event management platform) discusses a new tool that allows planners to measure attendee engagement but admits that firms need to build in a better support system for their clients.
  • Almost one out of two meeting planners today says that event technology is a primary pain point, according to a new study published by etouches.
    • rnobl005
       
      On one hand it's great that we have software that can assist planners, but it doesn't seem to be making their lives any easier.
  • “Planners cite poor transparency and accuracy over pricing, along with lack of clarity and poor response rates, as their main pain point with venue selection.”
    • rnobl005
       
      This is referring to the Cvent platform.
  • ...8 more annotations...
  • the overwhelming pain point for planners is the length of time it takes to receive responses from hotels for their digital requests for proposals (RFPs), and the often inaccurate and/or omitted costs supplied within those responses.
  • Post-event, 65 percent of planners say that they’re using technology to measure the overall return on investment (ROI), but at the same time, how they analyze and use that data to inform future event programming and design remains a challenge.
    • rnobl005
       
      This is referring to the etouches platform.
  • Toward that end, Cvent launched a new Group Business Intelligence tool this summer, designed to provide real-time data and analytics of hotels’ group business leads, and those of their competitors, in a single platform, helping hotel sales staff prioritize incoming queries and score leads.
    • rnobl005
       
      Hopefully this will make the RFP response process less overwhelming for the venue sales teams.
  • it’s incumbent on event tech firms across the industry to do a better job managing expectations and delivering the support necessary to help planners use technology more effectively.
  • we need to play a much more concentrative role in the process to help you benefit from it, because unless you benefit from it, and see the ROI, it’s just gonna be a pain in the butt
    • rnobl005
       
      This is a quote from Mike Mason at etouches.
  • With the exponential rise of digital RFPs, hotels are challenged with prioritizing the onslaught of proposals they receive, which is the root cause for the lengthy time it often takes to respond to planners.
  • Loopd integrates bi-directional wearable smart badges, a mobile event app, and a cloud-based analytics engine. When attendees are using the Loopd badges, which can transmit contact information and any other kind of digital content, event organizers can track how attendees are moving through the event, and which programming is most popular.
    • rnobl005
       
      This is a platform run by etouches. I would find this system really valuable if I were a conference attendee. It's a way for me to get the most out of the experience. However, a lot of this rides on the backend functioning properly.
  • The tool is also intended to make it easier for hoteliers to examine leads, dissected by specific time periods, customer segments, competitor rates, response times, and peak night volume, helping calculate the potential value of each piece of group business with more context and business insight than before.
11More

Casino Gets Hacked Through Its Internet-Connected Fish Tank Thermometer - 0 views

  • Internet-connected technology, also known as the Internet of Things (IoT), is now part of daily life, with smart assistants like Siri and Alexa
  • But of much greater concern, enterprises are unable to secure each and every device on their network, giving cybercriminals hold on their network hostage with just one insecure device.
  • There's no better example than Mirai, the botnet malware that knocked the world's biggest and most popular websites offline for few hours over a year ago.
  • ...7 more annotations...
  • Nicole Eagan, the CEO of cybersecurity company Darktrace, told attendees at an event in London on Thursday how cybercriminals hacked an unnamed casino through its Internet-connected thermometer in an aquarium in the lobby of the casino.
  • he hackers exploited a vulnerability in the thermostat to get a foothold in the network. Once there, they managed to access the high-roller database of gamblers and "then pulled it back across the network, out the thermostat, and up to the cloud."
  • compelling reminder that the IoT devices are theoretically vulnerable to being hacked or compromised.
  • Manufacturers majorly focus on performance and usability of IoT devices but ignore security measures and encryption mechanisms, which is why they are routinely being hacked.
  • Therefore, people can hardly do anything to protect themselves against these kinds of threats, until IoT device manufacturers timely secure and patch every security flaws or loopholes that might be present in their devices.
  • The best way you can protect is to connect only necessary devices to the network and place them behind a firewall.
  • educate yourself about IoT products.
  •  
    I found this article fascinating. It shows that no matter how much security we think we have, there will always be someone who is smart enough to hack you. We bring Smart devices into our homes and businesses to make our lives easier, yet these devices make us vulnerable to cyberattacks. In this article it details how a hacker(s) used a Smart thermostat located inside a fish tank to access and pull sensitive data out of a casino. I'll never look at the fancy aquariums in resorts/restaurants the same.
« First ‹ Previous 341 - 360 of 446 Next › Last »
Showing 20 items per page