Skip to main content

Home/ Hospitality Technology/ Group items matching "networking." in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
6More

United Signals It Wants a Better Deal with Reservation Middlemen - Skift - 0 views

  • The reservation services that middlemen technology companies provide to travel agency networks and online travel agencies are a particular sore spot for airlines.
  • Overall worldwide, airline lobbying groups say they pay $7 billion in fees a year to these reservation systems.
  • In the past, non-standard products like that have posed challenges for Sabre, Amadeus, Travelport, and Travelsky to display and distribute to travel agencies.
  • ...2 more annotations...
  • But beyond monetary concerns, there were antitrust issues at play, with the airlines contending that Sabre had a stranglehold on the domestic U.S. market
  • The distributors say they can accommodate technological requests from the airlines, despite the public skepticism expressed by some airline executives.
  •  
    This article demonstrates the way how relationship between the airlines (United) and the technology companies which serve as middlemen is build. According to the estimations, the airlines pay to the gds's about $18 per round trip ticket reservation, which results in 7 billion in fees that are payed to the gds's annually. The air companies consider these fees unfair in regard of the gds' performance. To compensate for these payments as well as to promote direct bookings, the airlines (namely, Lufthansa) have added a surcharge for any external bookings. GDS's, however, fight back and start litigations against Lufthansa. The decision on this case will either stop such a practice, or force other airlines to follow LH and add surcharges for gds's too. Another problem that airlines experience with GDS's is the presentation of non-standard products that the airlines offer. For example, it took the GDS's several years to correctly display the Ecomy Skycouch by Air New Zealand (buy 3 seats at the price of 2 to sleep across all of them during the long-haul flight). United is going to introduce its Basic Economy Seats with no carry-on luggage and no qualifying miles. However, they are not sure that the GDS' s will be able to display this product to the customers in a proper way so that they could fully understand what they are buying. The reason for that is that GDS's are mainly reluctant to invest in technologies that are focused on product differentation. In this regard, it becomes more difficult to compare fares since different set of services is included in different products. Thus, the customers might be mislead. Moreover, there are antitrust issues with the gds's. The airlines claim that Sabre has a stranlehold on the US domestic market. Such position allows it to ultimatum the airlines and voluntary decide on search display order. The airlines expect the GDS's to be more prone to partnership ralations. This would imply the fair compensation for what they add to the
5More

Budgeting for Cybersecurity: Risk vs Reward - NuData Blog - 0 views

  • Companies are facing an onslaught of cybercrime – everything from DDoS attacks to breaches to insider theft – and the numbers are staggering. Cyberattacks typically cost large businesses $861,000 and small business on average about $86,500, according to Kaspersky Labs. Jupiter Research is estimating that the cost of data breaches will reach $2.1 trillion globally by 2019. It is the frequency of attacks and the cascade of numbers which now makes this a CEO and Boardroom issue as cyberattacks could cause some major damage or even take whole businesses down.
  • IT Security budgets are set to grow 14% on average over the next three years with small business spending as little as a $1,000 all the way to a million dollars for large companies. While some analysts like Cybersecurity Ventures predict that there will be a burst of spending – 12-15% year over year growth through 2021, Gartner Research reports that IT security spending will account for less than 5% of worldwide IT spending.
  • You can also get more budgeting dollars by leveraging bottom line increases such as incentives for VIP customers, revenue increases, and spend increases throughout the customer lifecycle.
  • ...1 more annotation...
  • Security spending does not equal security effectiveness
  •  
    I found with this article that cyber attacks are becoming alarmingly more common than we have prepared ourselves for. Businesses now need to invest in their own cyber security department or, as the article suggests, apply a cyber security budget to each department. With security budgets predicted to increase 14%, money should be collected through the customers over a lifetime of the customer so that the budget is continually there. I found this article to stand out to me because I never thought of cyber security being so crucial, but it easily makes sense. I think a lot of business lack in providing the proper amount of security to prevent cyber attacks. Personally, I never heard of a cyber security department so this was new for me to read about.
15More

Hospitality and the Cloud | RapidScale - 0 views

  • scalability is one of its most popular features.
  • no hardware or software to purchase upfront.
  • cloud services are acquired on an as-needed basis, or a pay-as-you-go plan that leaves the business in control of its spending.
  • ...8 more annotations...
  • Cloud computing allows businesses like hotels, restaurants or transportation organizations to improve their guest experience
  • Guests can experience the efficiency of the cloud from the beginning of their stay to the end. For example, a guest can check into her hotel room from her mobile device before even arriving, via an online system. If she wants to book a spa appointment, she can do so online, also prior to arriving.
  • at the end of the trip, the guest can simply check out on her smartphone and be on her way. Cloud computing caters to the need for increased access, as guests now expect this type of connectivity from multiple devices, wherever they are.
  • cloud computing can reduce overall costs and resource needs, as well as enhance management system capabilities
  • cloud improves time to market of new systems and creates competitive advantages, quick! And better yet, it’s easier than ever to analyze all these things.
  • When it comes to cost, cloud is the clear choice,
  • The organization’s IT team doesn’t have to deal with patches, upgrades, performance tuning and other maintenance tasks.
  • It’s time for these organizations to look outside their establishment to improve customer service, innovation and business operations.
  •  
    Cloud computing is ideal for the hospitality industry. There is no need for upfront hardware or software purchases. A hotel, for instance, pays for services as it needs them which gives it flexibility in expenditures. For hospitality businesses that are often seasonally operated, the cloud allows them to scale the services they need depending upon seasonal demands: Increase computing when busy, scale back when things slow down.
  • ...1 more comment...
  •  
    Cloud computing also improves efficiency and reduces waste.
  •  
    I like you opinion that is scalablility. It needs inclination probably. In technology field many Cloud computings are cooperating with estimations. It needs more view points to prove that it's a strength for Cloud computing. According to Cloud computing methods, some chances based on one register matching to one password are possible. I think it's a fresh era to talk about many computers operating together to consider whether some jobs for related people could work together. Thinking about more sensitive site of cloud network. They are efficient in bank running. I think it's a relative reason to help people to know more about scalability in Cloud computing hospitality area. To make it more appearing to customers, the manager should take a purchase options on the view side that I love it. It's multi task. It's enterprising. According to passages, many opinions could be choosing from tabs due to period and seasons. I want to make sure about scalability that clients and customers are good enough for them to make more multiple options to take a preference look. It's financial economic computing assistance too maybe according to cost I think. In words, I think technology should keep scalability to let other clients and customers to put favors on it. No matter Sundays or cruise days.
  •  
    This article discusses how cloud computing is already taken into affect in the hotel industry. They used examples such as mobile check-ins using the online system. I can vouch for this because in my current hotel we use the mobile key service and this creates a contactless check in process. On our end of the stick we process the credit card on file and check them in and email the guest a welcome letter and advising they may use the mobile key to enter their room. This has benefited customer service experience especially with COVID still being a conflict in our industry. The cloud computing caters to the need of new access as this article states.
11More

Cybersecurity in Hospitality Industry - Types of Threats - Logsign - 0 views

  • implementation of electronic devices and similar conveniences also pose serious threats regarding the security of our sensitive information. That is why cyber security practices gain much more importance in the hospitality industry. I
  • The term cyber security is used to refer to the methods and practices that aim to defend devices, networks, servers, electronic systems and all kinds of data from ill intended attacks.
  • Cyber security professionals aim to keep such malicious intended individuals away from your systems.
  • ...7 more annotations...
  • Cyber security practices often involve the use of a tool or software such as antivirus programs, firewalls, anti malware software and such. In accordance with the needs and vulnerabilities of your organization, various cyber security solutions can be employed and configured. You can opt for getting professional help and/or hiring a team of cyber security professionals for this task.
  • In the past years, we have witnessed many hotels being victims of cyber criminals. Such incidents lead serious data leakages and hurt the reputation of the organization.
  • Customer Data/Identity Theft: When booking a hotel room, we share some of the most sensitive pieces information regarding us: Our name, address, payment information. That is why most hackers try to steal customer information from the hotels using malware, computer viruses and social engineering methods.
  • he term phishing refers to the techniques used to deceive and convince professionals to leak information. The most popular phishing techniques include fake web pages, phone calls, text messages and e-mails.
  • Darkhotel hacking: This technique involves hacking the hotel WiFi and steal information from the visitors.
  • If you want to protect your organization from cyber threats, first you need to inform your employees.
  • Secondly, you must invest in some bullet-proof cyber security software including but not limited to antivirus, antimalware and firewalls. You must also hire a team of IT specialists to ensure that your organization is protected 24/7.
  •  
    This article talks about the type of threats the hospitality industry can face, an explanation of cybersecurity, and how to protect your organization from cyber threats, especially phishing.
7More

Data-driven Disney monitors your every move | E&T Magazine - 0 views

  • Imagine living in a place where your every move is surveilled. A place created in the image of one almost mythological figure, where every step you take is logged into a central database, and where the shadowy figures watching attempt to elaborately orchestrate events to manipulate people
  • In addition to working at close range on Oyster-card-style readers, the transmitter inside enables it to be tracked from what is thought to be around 12 metres.
  • Sotto likens the tracking to the experience of a good butler, who will anticipate a person’s need and provide it at just the right moment. “Real luxury and real service is frictionless. And that’s what you’re really trying to do.”
  • ...3 more annotations...
  • Collecting Magic Band data is similar to this, but happens on an industrial scale, and the fruits it bears are hugely valuable for planning and running a park.
  • They can deploy the workforce as soon as it’s required, so there will be a faster service,” explains Chiara Bertoldini from DRFC, a crowd analytics firm. So if the queue for the new Star Wars Smuggler’s Run ride reaches two hours, which is not uncommon, Disney can deploy Kylo Ren and a couple of Storm Troopers to perform some impromptu street theatre.
  • Theme parks are not the only places that deploy this sort of tracking technology. Elsewhere it has proved controversial, such as when the London Underground rolled out Wi-Fi tracking technology across its network.
  •  
    This article offers insight into extreme tracking and using patterns and data to customize the guest service experiences. It also provides data on ho to best keep a guest engaged whether it be through virtual or even physical means that can be activated by a certain data set collection. A good example of this is how Disney can monitor wait times at the park and then dispatch live entertainers to the area as a means of distraction and simultaneous product placement and marketing.
6More

10 Disadvantages & Risks of Cloud Computing | by Sarah Lavinski | FAUN | Medium - 1 views

  • Cloud Computing is a combination of the use of computer technology (computing) and Internet-based development (cloud). Cloud is a metaphor of the internet, as is the cloud that is often depicted in computer network diagrams.
  • data and cloud protection must be good because if it won’t be dangerous for data confidentiality.
  • weakness of public cloud is where everyone accesses the same server and server and will increase the risk of attack, and down the server.
  • ...2 more annotations...
  • Marketplace companies such as Amazon, Alibaba and Airbnb have considered cloud computing risks and benefits.
  • Disadvantages of cloud computing that has less security can cause data leak to public.
  •  
    This article discusses the risks and disadvantages with cloud computing. Some people love using the cloud and they find it the best way to save their information. Others prefer the use of an external hard drive. While there are pros and cons to both companies should not only rely on cloud computing. As you can find in this article there are some definite disadvantages that need to be worked out before this becomes our only tool for saving information.
14More

How restaurants are bringing tech to the table in 2021 | Restaurant Dive - 1 views

  • Sit-down restaurants have traditionally abstained from digital innovations and other kinds of consumer-facing technology out of fear that these changes could cheapen the diner’s experience and undercut their value proposition
  • One-hundred percent of foodservice operators reported in a December Panasonic survey that the pandemic has intensified their sense of urgency to adopt transformational technology, and respondents are implementing tech that prioritizes safety and self-service in response.
  • This prioritization seems to directly reflect diner sentiment, with 21% of consumers planning to dine inside a restaurant reporting that contactless payment options would factor into their restaurant choice. This is especially true for younger consumers: 29% of Gen Z diners said contactless payment solutions would influence where they eat compared to 24% of millennials and 18% of Gen X consumers. 
  • ...10 more annotations...
  • Fifty percent of full-service restaurant operators said they have added digital menu access via QR codes since March 2020, according to NRA’s 2021 State of the Industry Report. But it hasn’t become a point of differentiation in the mind of the consumer — only 1 in 5 diners said the option of accessing a restaurant’s menu through their phone or a QR code would make them more likely to choose one restaurant over another in the next few months. 
  • "People were less inclined to look up drinks, cocktails and wine through the QR code, so more often than not we would drop the beverage menu with each guest [that featured] a QR code for the food menu, and if they wanted a [physical] food menu it was available upon request."
  • The functionality of an NFC tag or a QR code on a table brings so much digital transformation opportunity that maybe the aesthetic that used to be a primary concern is now a secondary concern."
  • among diners who plan to eat inside a dining room or fast food concept in the next few months, 64% say they would sit in the section that offers traditional table service
  • Allowing diners to order and pay at their tables without a waiter, however, could have a material impact on sales and diner satisfaction, he said, because it takes pressure off restaurant employees and diners when the dining room is very busy.
  • There was a stat we were able to generate that paying on your own device rather than waiting for a server to drop off the check actually saves 21 minutes of table time on average across our network… and that’s great for a restaurant because they have the ability to increase their revenue per hour per seat,
  • Digital integration at the table also primes diners to become more loyal customers and gives restaurants greater customer ownership in and outside of the restaurant
  • I can automatically redeem my offers and my coupons from a loyalty program. And from a digital transformation transformation perspective, I'm now a user within that restaurant's ecosystem," May said. "So that means online I can be provided offers that are tailored and personalized to what I had [during] the meal at the restaurant."
  • Some experts believe that air technology within restaurants could eventually become featured design elements as well.
  • According to NRA data, 85% of adults believe going out to a restaurant with family or friends is a better use for down time than cooking at home, and 67% of consumers surveyed between Dec. 4-6 reported they aren’t using restaurants as much as they’d like. 
  •  
    This article talks about how we have seen technology in restaurants change in the past year as well as what to expect moving forward. Restaurants have begun to see how new technologies like contactless pay are allowing them to expedite services and benefiting their businesses. It also discusses how even though things like QRs have become more common they won't replace aspects of service experience that are crucial to hospitality.
29More

The Different Types of Cloud Computing and How They Differ - 0 views

  • clouds, in the tech sense, are incredibly versatile
  • Cloud computing still relies upon the same physical server hardware that forms the backbone of any computer network. The difference is that cloud architecture makes the processing power and storage capacity of that hardware available over the internet.
  • Cloud deployment describes the way a cloud platform is implemented
  • ...25 more annotations...
  • , how it’s hosted, and who has access to it.
  • A completely on-premises cloud may be the preferred solution for businesses with very tight regulatory requirements,
  • The great advantage of a public cloud is its versatility and “pay as you go” structure that allows customers to provision more capacity on demand.
  • On the downside, the essential infrastructure and operating system of the public cloud remain under full control of the cloud provider
  • Public clouds typically have massive amounts of available space, which translates into easy scalability
  • A cloudbursting model uses the public cloud’s computing resources to supplement the private cloud, allowing the company to handle increased traffic without having to purchase new servers or other infrastructure.
  • less economical model than the public cloud
  • private clouds lack the versatility of public clouds
  • Simply put, hybrid clouds combine public clouds with private clouds
  • The primary advantage of a hybrid cloud model is its ability to provide the scalable computing power of a public cloud with the security and control of a private cloud
  • A misconception about both colocation and the cloud is that they’re an “either-or” investment. As mentioned, the two can be deployed together as part of a hybrid cloud model, enabling more streamlined application management
  • it can be cost effective, though the initial expenditure for the private cloud should be considered
  • work with a service provider who has significant experience in the the hybrid cloud model as there are potential performance and security risk inherent to the need for the two different servers (public and private) to communicate and share data.
  • Although not as commonly used as the other three models, community clouds are a collaborative, multi-tenant platform used by several distinct organizations to share the same applications.
  • scalability is a benefit
  • system remains highly flexible,
  • The shared storage and bandwidth can create issues with prioritization and performance as servers adjust to demands
  • In some cases, a single public cloud isn’t enough to meet an organization’s computing needs. They turn instead to multi-clouds, a more complex hybrid cloud example that combines a private cloud with multiple public cloud services
  • IaaS is the most comprehensive and flexible type of cloud service available. Essentially, it provides a completely virtualized computing infrastructure that is provisioned and managed over the internet.
  • Situated a bit higher up the cloud computing pyramid is PaaS
  • PaaS provides the framework needed to build, test, deploy, manage, and update software products
  • SaaS is a fully-developed software solution ready for purchase and use over the internet on a subscription basis
  • If controlling the environment is essential, as are tight security regulations because of your industry, private cloud solutions offer both security and control.
  • when looking for a cloud services provider, you want to choose a company that not only knows, but understands your business or industry
  • The bottom line is this: if you are in the market for a colocation partner, you want to make your research process as exhaustive as possible. Consider all possible scenarios, all possible needs, and how your provider can meet or exceed your service expectations while partnering with you for succes
  •  
    This article gives examples of the various types of cloud computing and their advantages and disadvantages. It shows that there are cloud-based options that can be appropriate for every business.
6More

How the Internet of Things (IoT) can Benefit the Hospitality Industry - 2 views

  • Many within the hospitality industry have already incorporated the Internet of Things into their businesses, because the technology offers a number of crucial benefits that are especially relevant to hotels. These benefits range from allowing companies to save on energy costs, through to delivering a better customer experience.
  • This can improve data collection, increase levels of automation and allow for multiple devices to be controlled or monitored from one centralised place, such as a phone or tablet.
  • the main way is through delivering a superior customer experience.
  •  
    Internet of things Internet of things will continue to lead hotels to be more Eco-friendly, technological advanced and enhance guest satisfaction. Allowing guest to have the ability to customize there room to there exact expectations. Guest today are more conscience of the environment and allows them control energy usage. With more technology in a hotel means more upgrades to network, upgrades more security to protect the hotel data. Finally guest like new and shiny, this will allow hotels to market the hotel as the most technological advanced hotels. Guest will like to stay at hotels that meet their needs for tech upgrades and they would be willing to pay more for these hotels.
  •  
    The way the article reports the IoT, I feel its a positive advancements for the guest experience. With the trend of mobile devices having multiple uses, making travel accommodations and services at the control of ones finger tips seems logical and progressive. Using the Internet to enhance the guest experience allows staff to continue to provide quality service. The information the article report's presents technology as an aid and not a replacement of personnel.
  •  
    An emerging trend in recent years, specifically in the hospitality industry has been the IoT (Internet of Things). It is referred as the " inclusion of internet connectivity within everyday devices and appliances ". Hotels have begun incorporating different types of technology, which has allowed companies to provide a better customer experience, manage energy costs, and automate certain processes. Bluetooth,GPS, and Beacon technology, electronic key cards,voice controlled customer service are just few of examples of how the internet is used to provide a new hospitality experience.
12More

5 Cloud Computing Disadvantages - 0 views

  • “The Cloud,” refers to data that you can send and access from a remote server
  • must always have an internet connection.
  • f you lose your network connection because of a storm or an outage, you may experience some downtime.
  • ...8 more annotations...
  • Not all cloud providers are created equally
  • value of unlimited bandwidth
  • ideally be working with
  • You are, essentially, trusting another party to take care of your data
  • Cloud hacking cases as recent as the past few months have shown that not all cloud providers are as secure as they claim to be
  • One of cloud computing’s greatest disadvantages is that you don’t always know which providers you can trust.
  • You cannot fix your cloud computing problems in-house
  • Cloud computing is a powerful tool, but you may still find yourself trapped with certain limitations like speed, space, and availability. In the end, the benefits of cloud computing technology come down to who you chose to provide it.
  •  
    Cloud Systems have many disadvantages, the big three include downtime, connectivity and security.
14More

Attacked by Ransomware, Many Companies Opt to Pay Up - CFO - 1 views

    • emmajeenie
       
      The demanded ransom is often a moderate amount that would pale in comparison to the recovery and reputational costs for a company that refuses to pay.
  • Hospitals, for instance, are frequent targets of these kinds of attacks, in part because people’s lives are on the line so they have to make quick decisions.
  • , in a ransomware attack the data isn’t released or leaked or sold. On the contrary, in most cases, data and infrastructure aren’t compromised at all; its owner just can’t access them.
  • ...11 more annotations...
  • y rose 41% from 2018 to 2019 to more than 205,000 globally, according to newly published data.
  • the security firm Coveware estimates the average payout for those that did was about $85,000 during last year’s fourth quarter, and more than $190,000 in December.
  • its leaders give in — and pay the ransom.
  • Organizations have more to lose financially from the inability to conduct business than they do from just paying the ransom
  • It’s like the plot of a James Bond movie: Hackers take control of a global organization’s computer systems and threaten to destroy its records, steal its intellectual property, and drain its bank accounts unless a hefty ransom is deposited into an untraceable offshore bank account by the end of the day.
  • ” the ransom is likely a significantly smaller amount than what it may cost to address a threatening public issue or the time and money necessary to rebuild the confidence in a brand or company.
  • Experts suspect that the actual number of ransomware attacks is much higher than the reported number, citing reasons ranging from fear of job loss, investor withdrawal, and reputational damage
  • Moreover, while public companies are required to report cyberattacks to regulators, private organizations are under no such mandate. Reporting attacks to law enforcement often may cause lengthy investigations
  • A hacker can keep repeating a ransomware attack until the security flaw is fixed or they are caught or reported.
  • Organizations can undertake a few basic defensive actions to mitigate the impact of a ransomware attack. Frequently backing up data and storing it on different networks is one way,
  • reducing the number of outside apps the system uses, fixing software vulnerabilities immediately, and properly training and educating employees on what to look for and whom to alert if something appears suspicious.
11More

Why Proximity Marketing Failed and How it Can Succeed in 2019 - 0 views

  • According to Boston Retail Partners, just 13% of retailers can identify customers as they enter a store, with another 10% identifying customers at checkout. In comparison, 60% of retailers identify customers during online shopping.
  • One of the biggest reasons for this is that beacon technologies have required customers to have bluetooth turned on. Beacon programs also often require customers to have download the right app and have that app turned on
  • A survey conducted by Borrell and Associates discovered that just 25% of retailers think beacons have a greater-than-50 percent chance of driving sales in stores.
  • ...7 more annotations...
  • The truth is that beacon programs routinely fail to offer customers requisite value.
  • According to research, consumers change phones often, every 2-3 years. When customers change phones they also change their MAC addresses. When this happens, retailers instantly lose insight into that individual’s historical behavior.
  • According to econsultancy, only 4 percent of consumers have ever downloaded a luxury retail shopping app. And even consumers who do download retail apps only spend 5% of their time using shopping apps. In truth, a proximity marketing strategy based heavily on an app can present some serious friction. As a result, 44% of retailers have removed their apps from the app store since 2015 and 56% fail to regularly update that app.
  • Though there have been historic limitations, proximity marketing is not going away it’s merely evolving
  • [retailers] will embrace neural networks and machine learning devices to get more connected. Analysts will use customer … traffic and behavior data to create experiential shopping destinations.”
  • Using AI-powered face recognition enables retailers to instantly recognize when individuals enter a store. While consumers change their phones regularly, they don’t change their faces
  • Facial recognition can also remove friction across the buying journey by offering the ability to seamlessly pay by face, verify age, or participate in loyalty program
  •  
    Consumers change phones often which in turn changes their MAC addresses. Retailers then lose all the the consumers behavior. Most consumers also rarely download retail applications.Although proximity marketing has had its limitations, it has continued to evolve which means that it will be present in the future.
13More

What's New for Meetings at Walt Disney World's Swan and Dolphin - 0 views

  • Disney’s Swan and Dolphin makes updates to its property with meeting delegates in mind.
  • 50 percent of the Swan and Dolphin’s business comes from meetings groups, making it one of Marriott’s top meeting hotels.
  • 2,270 guest rooms and over 333,000 square feet of meeting space on site,
  • ...9 more annotations...
  • The renovation is immediately noticeable in its wow-worthy lobby, inspired by water elements.
  • Swan and Dolphin broke ground on the construction of a new tower on its property, which will add 349 guest rooms and 21,330 square feet of new meeting space, including a 6,000-square-foot rooftop ballroom and terrace from which guests can view Disney’s fireworks.
  • tower will contain 151 executive meeting suites, featuring guest rooms connected to small meeting spaces
  • “The Cove,”
  • “The Caribbean Room” is open for business at the Dolphin. Ideal for breakouts, small meetings and event work rooms
  • the Swan Resort opened a similar restaurant in August, serving coffee, ready-made sandwiches and snacks.
  • Shula’s Steak House recently completed a refresh of the restaurant space and menu as part of a branding update for Shula’s Steak House.
  • rooms are available for group buyouts.
  • transformation includes an expanded bar and lounge featuring a three-sided, wraparound bar for networking and socializing, as well as seven new menu items, including pan seared scallops and a 22-ounce dry-aged ribeye
  •  
    Disney's Swan and Dolphin convention centers breaking ground for "The Cove" which is set to open in 2021 which adds 349 guest rooms and 21,330 square feet of new meeting space. Both resorts are also opening new restaurant space with the ability for group event buyouts in private dining rooms.
7More

Virtua Hospitality debuts online event platform | Hotel Management - 0 views

  • Virtua Hospitality launched UgoVirtual, an online platform designed to meet the virtual travel and event management/hosting needs of the global travel and hospitality sectors
  • UgoVirtual platform allows event organizers and meeting planners to virtualize a variety of even
  • , such as industry trade shows, corporate meetings and conferences
  • ...3 more annotations...
  • The flexible and highly configurable UgoVirtual platform can be used to host a standalone online event or alternatively, to augment an on-site event by creating a virtual version of it for remote attendance, participation and learning.
  • Virtual events are the future of our industry since they can be used to expand both the attendance and reach of on-site conferences and meetings. With the advancement of digitization, virtual concepts are poised to become the new reality for the hospitality and travel sector.”
  • Registered attendees can access the event via any internet-enabled desktop, tablet or device to visit various locations and participate in a range of activities, such as live keynotes and breakouts, on-demand sessions, 1:1 chat, social networking, peer collaboration and much more
  •  
    Virtua Hospitality launched UgoVirtual, an online platform which allows event organizer to virtualize many events. Registered attendees can access events via several devices and participate in many activities. As mentioned by Mike Blake, Virtual events is said to be the future of the industry.
29More

5 Ways POS Is Changing (And Why It Matters) - 0 views

  • Businesses have moved from traditional cash registers and stationary credit card readers to iPads and even mobile- or cloud-based POS systems.
  • Breadcrumb, a restaurant cloud-based POS system
  • Square allows businesses to transform iPads and smartphones into a POS system
  • ...22 more annotations...
  • One e-commerce solution is Shopify's POS system
  • the Shopify POS synchronizes and streamlines your financial and product information in a centralized dashboard.
    • npate083
       
      Shared commerce streamlines financial and product information in a centralized dashboard. It provides the user with real-time data and customer insight without having to run reports on multiple systems.
  • real-time data and customer insights
  • without the hassle of running reports on multiple systems.
  • Businesses should consider allowing mobile payments, as customers are shifting away from cash. 
  • businesses don't need any heavy equipment overhauls
  • Mobile credit card processing services (Square, PayPal Here, Flagship ROAMpay) simply require a credit card reader attached to a smartphone or tablet with the necessary mobile app, while mobile wallet providers (Google Wallet, Visa Checkout, Apple Pay) and loyalty mobile apps (Starbucks, Daily Deals) allow customers to pay directly from their smartphones or by using a POS scanner to read barcodes or QR codes on their screens.
    • npate083
       
      Mostly everyone is switching to mobile payment. It is much easier and convenient. As a business, it is vital to have mobile POS system so customers can pay directly from their phone.
  • New POS systems integrate real-time transactions with CRM solutions to help businesses increase sales and boost revenue
  • POS integration lets businesses create client records, CRM tasks and email marketing lists
  • ability to extract valuable information from POS transactions to help business owners make smarter business decisions.
  • to improve customer experience and acquisition
  • enable businesses to collect all types of customer data from POS transactions,
  • POS software tool
  • data-gathering and reporting features
  • Detailed reports include inventory and volume analysis, top-selling items, revenue and profit margin optimization, and staffing needs
  • Toast is a POS system
  • "restaurant operations by combining POS, front of house, back of house, and guest-facing technology on a single platform"
  • "monitor restaurant sales, labor costs, food costs, and more in real time, at home, and on the go with powerful reporting capabilities."
  • , POS systems need more security as the technology advances.
  • (IoT) – the interconnectivity and communication of devices, networks and physical objects over the internet
  • POS systems are more vulnerable than ever to hacks and data breaches
  • US-CERT recommends protecting POS systems by using strong passwords, ensuring you have the latest POS software updates, installing a firewall, using antivirus programs, restricting unauthorized internet access (such as for purposes other than POS transactions) and disabling remote access to POS systems.
  •  
    This article sums up the ways in which POS is currently changing. These ways include by using shared commerce POS systems, mobile POS systems such as Square and PayPal, integrated real-time transactions with CRM solutions, and POS security. 
  •  
    This article sums up the ways in which POS is currently changing. These ways include by using shared commerce POS systems, mobile POS systems such as Square and PayPal, integrated real-time transactions with CRM solutions, and POS security. 
12More

Hotels, Technology, & the Cybersecurity that Protects Them - Armor - 0 views

  • Hotels, Technology, & the Cybersecurity that Protects Them
  • introduction of virtual assistants like Alexa in hotel rooms
  • biometrics for guest access into their rooms instead of the standard room keys
  • ...9 more annotations...
  • register your fingerprint at the front desk
  • mobile keys
  • hat’s most worrisome is the amount of information collected and stored by Internet of Things (IoT) devices, like these virtual assistants and the mobile keys solution. After all, personal data has always been a prized target of cybercriminals.
  • The 2018 Trustwave Global Security Report listed the hospitality industry as one of the top five industries subjected to network breaches each year. The more technology added to help guests also means the industry needs to think harder about how they store and protect their guests’ data. If a hacker compromises the technology or infrastructure environment where guest data resides, guests could have their personal data compromised.
  • the balance between usability and security for their apps and software is critical.
  • Consumers, who are most likely to be victims, have their share of responsibilities.
  • osting on social media about how fun a vacation is could notify attackers that your valuables are sitting at home unprotected
  • it’s the hotel’s IT infrastructure that’s usually the targe
  • Unfortunately, most hotels do not have a dedicated on-site cybersecurity staff (or even IT staff for that matter).
9More

(PDF) THE IMPLEMENTATION OF E-MARKETING IN THE HOTEL INDUSTRY: THE CASE OF ISTRIA COUNTY - 0 views

  • e research was conducted using a survey method. e research results show that hotel companies in Istria County have achieved a medium or even high level of implementation of e-marketing practice. e companies with a higher level of e-marketing practice also achieve better business performance. However, the survey also revealed the constraints to the widespread application of e-marketing in the hotel industry.
  • e increasing presence of the Internet in daily lives has resulted in the Internet an essential media in marketing communication.
  • To gain competitive advantage in the demanding tourist market, it is important nowadays for a hotel company to have its own website, promote its products through social networks and mobile applications, use e-mail as a channel of communication with its business partners and customers, and apply all available information-communication technology (ICT).
  • ...5 more annotations...
  • Some authors emphasize the role of the Internet in the application of e-marketing, while others perceive that term broadly, including the application of other ICT solutions.
  • consider the concept of e-marketing as a means of moving products or services from producers to tourists, and using the Internet as a means of promotion and a sales channel.
  • the use of electronic data and applications for planning and executing the conception, distribution and pricing of ideas, goods and services to create exchanges that satisfy individual and organizational goal
  • Internet marketing, e-mail marketing, mobile marketing, intranet marketing and extranet
  • marketing, as well as dierent e-marketing forms
  •  
    This article is actually based on a case study on the implementation of e-marketing in the hotel industry. This article examines the level of implementation of e-marketing practice in the hotel industry. It is an empirical research article conducted in Istria County, the most developed tourist county in Croatia.
6More

The Importance of Infrastructure: Planning for the Future - 0 views

  • Unlike a commercial building where cabling systems have an economic life of 5 to 10 years, the physical plant of a hotel is much more difficult to change in the future.
  • hotels still require an increasingly sophisticated cable plant.
  • This network complexity should be addressed sooner rather than later in the building process and pre-opening phase.
  • ...2 more annotations...
  • It’s time that hoteliers stopped overlooking the importance of infrastructure, and start ensuring it is addressed during a major renovation or re-development project.
  • It is much more expensive and very difficult to re-wire a hotel in the future, than it is to plan ahead for changes.
  •  
    The article discusses how the physical plant of a hotel is important to consider during the early phases of building the establishment because it can get much more expensive later on if it is not dealt with from the beginning. The author believed that this simple detail is what separates a prosperous hotel a part from a retired hotel company. They also noted that trying to take care of the physical plant during a remodeling phase or a major renovation project would be a good alternative to ensure that the physical plant is thought out appropriately.
6More

Trends in Management Information Systems - 1 views

  • (ERP) software is a form of MIS that is installed in all departments and locations of businesses to enhance the availability of company information.
  • Enterprise resource planning
  • Another trend in MIS is the ability for companies to network with other companies for business purposes.
  • ...2 more annotations...
  • An important trend in MIS is the ability for companies to use data mining tools to collect information regarding consumer purchases and other economic trends.
  • Computerized MIS programs have led to a new career in database management and consulting.
  •  
    This article gives several development trends of MIS, of which enterprise resource planning is an important development trend. With the development of information technology and the globalization of the market, the use of information technology to achieve more effective resource management has gradually become a trend. I believe that the application of MIS will become more and more common.
« First ‹ Previous 641 - 660 of 768 Next › Last »
Showing 20 items per page