Skip to main content

Home/ Hospitality Technology/ Group items matching "networking." in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
2More

IT in hospitality - Express Computer - 1 views

  • Hospitality is amongst the fastest growing sectors in India today, with domestic and foreign tourism, and increased business travelers fueling this momentum. The sector is known to hold as much promise for the country as the much touted IT, ITeS and manufacturing industries. India’s travel and tourism industry is expected to grow 8.4% this year and 8% annually between now and 2016, according to the World Travel & Tourism Council. Conventionally having stayed away from technology, the hotel industry in India is observing a sea change—in its objective and management’s role towards delivering quality customer service. ‘Service’, related to personalized care and hospitality, is finding a friend in advanced systems and gadgets that enhance the service delivered.
  •  
    This article talk about the IT in hospitality industry. They give a example of the India. The number of the India's travel and tourism industry is grow 8.4% in 2008 and will be 8% more increase between now and 2016 according to the World Travel and Tourism Council. The hospitality industry should know the customers needs and the goal of the meeting them should be figured out in such a way that the cost of offering the service(s) does not pinch the company balance sheet i.e. variable costs should not show fluctuations northwards. Marketing gurus would always adhere to one statement for advice: cost need to be justifiable through high probability of ROI. The selection of technology in itself is a vital step. Another global feature that is extremely important is a detailed guest, group and company records. Used with a variety of customized reports, these detailed records allow precise targeting of various marketing efforts to improve occupancy rates, increase yield and enhance strategic planning. Each module should have a customizable report selection menu. The reports should have provision for sorting and filtering of data to enable viewing of the exact information might be required at a moment's notice. A good PMS enables a hospitality enterprise to increase revenue and occupancy, improve guest loyalty and reduce costs by centralizing and streamlining your operations. Forward-thinking properties have already begun building a network infrastructure that offers the flexibility and scalability to adapt to the ever-evolving guest, staff, and property management needs. Ajay Goel, Senior VP - Industry Business, Strategy, Operations, Cisco Systems India & SAARC opined, "These next-generation infrastructures are based on a converged network. They integrate with today's solutions-such as reservation, surveillance, and billing systems-and support the newest applications and technologies. The goal is to take advantage of tomorrow's opportunities while protecting e
10More

IT investment proves a help to struggling Station Casinos - 2 views

  • Station Casinos, which runs 18 casinos and hotels that are located off the Vegas Strip and primarily serve residents of the Las Vegas area rather than tourists, is seeing major benefits from the heavy investment in unified communications, unified computing and wireless technology, said company officials accompanying journalists on a tour of the Red Rock Casino and Resort here during the Cisco Live conference this week.
  • Unified Computing System (UCS
  • Cisco's Call Manager software.
  • ...2 more annotations...
  • wireless IPICS,
  • The UCS and related technologies that Station Casinos has installed have made the network more adaptable and resilient,
  •  
    Unified Computing System (UCS) technology is widely used byStation Casinos Inc., which is a one of high-tech Station Casinos Inc. invested and do a good implement in their properties. It not only help this company do a good business and also help the it employees keep their jobs.
  • ...2 more comments...
  •  
    I see that about 80% of our revenue comes from slot machines, I think that's why IT investment means a lot and so helpful for them.
  •  
    Station Casinos Inc. was struggling to reorganize under bankruptcy protection. And the last, company decided to increase the IT investment to solve this problem. Station Casinos, which runs 18 casinos and hotels that are located off the Vegas Strip and primarily serve residents of the Las Vegas area rather than tourists, is seeing major benefits from the heavy investment in unified communications, unified computing and wireless technology recent network installations include a variety of Cisco Systems Inc. technologies, according to Baltz and Bryan Miles, director of networking and telecommunications. The company has deployed 3,000 of 9,000 Internet Protocol phones so far, and it is using Cisco's new Unified Computing System (UCS) technology to consolidate data center operations. Miles said UCS allowed the company to cut the number of data center server racks from 12 to one. Cisco officials noted that IPICS systems are normally used by emergency personnel to communicate across various wireless bands while responding to fires or other disasters. The updates to the Station Casinos network have helped the company connect 15,000 different devices, including some of the 23,000 newer slot machines installed at its various casinos.
  •  
    Hotel guests are a captive audience and are often looking for the convenience factor when making their purchasing decisions, such as where to eat that night. If hoteliers take the initiative with their WiFi solution, they could be soon be reaping the financial rewards.
  •  
    Implementing the right technology can bring a company back to business therefore it is really important to Know what technology is the best for the organization in order to improve productivity and attract potential clients.
1More

Are You Practicing Proper Social Networking Etiquette? - Forbes.com - 0 views

  •  
    This article brings up alot of great points regarding social networking in the business world. You can become facebook friends with coworkers, but you have to be careful with what image you are protraying. They could be checking to make sure that you are not making a bad image that could reflect on the company.
2More

Linkedin - Networking Tool - 2 views

  •  
    The reason for this post is that i am currently using Linkedin part of my networking tool and i am sure many are using this as well. With this tool, you can really use it to its maximum capacity including, having discussions on certain topics, posting job vacanies, getting to know people of your own field of work, creating a group and inviting people to join the group.... the functions are endless. I really use this effectively on a daily basis trying to find candidates, posting jobs and i do get a lot of responses as well.
  •  
    Do agree! Linkedin provides an effective way to network professionally and beyond. I also use the tool daily to keep abreast on trends, analysis, and personal network of professional affiliates. Ernest Bailey | LinkedIn profile http://linkd.in/19filwl
4More

SDD (JAZZ Fusion) - Cloud-Based Communications Billing Software and Telecom Profitabili... - 0 views

  • JAZZ Fusion can be implemented as premise-based software serving a single property, as hosted software serving an entire customer enterprise, or as a software service (SaaS) that can be subscribed to over public and private networks.
  • The benefits of JAZZ Fusion include:
  • Key technology advantages:
  •  
    This article introduce a software called SDD(Jazz Fusion), which is dealing services with customers and all the functions and benefits of this system. SDD provides internet and VIOP services, shifts voice technology integration, consolidate cloud to allow hotels maintain voice-switching system and magnify with TeleManager services. Voice and internet billing, telecommunication management, and ongoing profitability support. 
4More

How Marriott Wants to be the Red Bull of the Hotel Industry | Variety - 0 views

  • Marriott International today announced the formation of an internal content studio through which it will develop, produce and distribute a slate of entertainment projects that will include web series, short films, TV shows, music events and movies. The goal for the Bethesda, Maryland-based company is to appeal to the “next-generation traveler” — made up mostly of millennials — with story driven content marketing.
  • With 18 brands, Marriott is the world’s largest hotel company with over 4,000 hotels in 78 countries. Through its individual properties, in-room TVs, websites, mobile platforms and reward program, Marriott certainly has the network through which it can distribute entertainment.
  • To promote the projects, Marriott will use its website; its mobile app; various social media channels; in-room TV network; and Marriott Rewards, a loyalty membership program that has over 45 million subscribers.
  •  
    Marriott is seeking to become the Red Bull of the hotel industry. While I first thought that this meant that it wanted to become synonymous as a brand with hotels generally, as Red Bull's brand is with energy drinks, what Marriott is actually pushing for is a sophisticated eMarketing strategy. The company is focusing on content marketing by developing and producing (in-house or through contract) its own videos, shows, web series, movies, musical events, etc. and distributing it through their network of properties. The distribution strategy will focus on using Marriott's 4,000 rooms, which are located across 78 different countries globally. In addition to pushing content through in-room TVs, Marriott will also use its rewards program and mobile app to distribute what it produces to its consumers. Marriott does not plan to abandon its print or online advertising; it is simply adding another platform to increase and diversify its global reach and strategy. The ultimate goal is to fill rooms, but with Millennials, creating long-lasting, individual, memorable experiences is important to overall brand loyalty. Thus, content marketing provides a means by which Marriott can offer original, targeted content to its consumers. In the future, it can become a full-fledged development studio providing complete content for its consumers, in turn pressuring companies like Netflix, Hulu, etc. In the short-term, producing content and releasing it through their app will allow Marriott to increase brand awareness, loyalty, and the overall guest experience. Over time, Marriott is not simply pushing a product or service; they are building meaningful relationships with their consumers.
14More

Cybersecurity Tactics for a Hotel Industry that's Under Siege - 0 views

  • Credit card fraud and identity theft should remain high on the hotel and lodging industry’s radar. Just ask Starwood Hotels & Resorts Worldwide (including their Westin, Sheraton and W Hotel brands), Hilton, Hyatt and the Trump Hotel Collection, all of which were victims of highly publicized, major breaches in the hospitality industry last year. 
  • Hotels need a ‘toolbelt’ of various security technologies that can be used to prevent malicious attacks. A managed firewall is essential, blocking dangerous traffic from coming onto the network and preventing sensitive data from being exfiltrated, or sent, to the hackers.
  • In the breaches mentioned above, point-of-sale (POS) systems were attacked and malware launched to acquire cardholder names, credit card numbers and expiration dates.
  • ...7 more annotations...
  • It can be difficult and expensive to hire and retain an IT security team
  • One way to implement these advanced toolsets includes outsourcing to a managed security firm specializing in this type of service
  • POS systems are a weak security point for many networks because they are constantly in use — and aren’t always patched, updated or protected from vulnerabilities as frequently as required.
  • personal details for hotel guests are frequently stored in a variety of locations, including billing, facilities, restaurants, etc.
  • otels are made even more vulnerable thanks to POS system provider breaches
  •   Phishing remains a particularly popular tactic used by hackers everywhere, including those that are targeting the hotel industry to trick both prospective guests, who give up credit card and personal details, and insiders, who then give up valuable login credentials.
  • File Integrity Monitoring (FIM), Unified Threat Management (UTM), and Security Information and Event Management (SIEM) should also be considered
  •  
    This article talks about how there is a serious concern in the hotel industry when it comes to credit card and identity theft. They talk about how all the major brands in the hotel industry were all victims of highly publicized, major breaches in the last year alone. Also, including airline and banks, hotels maintain a wealthy amount of database of personal and financial data. For example, with new technology systems being created, POS systems are a weak security point for many networks because they are constantly in use and are not always updated or even protected from vulnerabilities. The article talks about personal details for hotel guests are frequently stored in a variety of locations including restaurants, facilities, and government buildings, so hackers have a greater possibility to access your personal information. The bigger hotels are in more danger because of the volume of guests that come in and out of the location. Smaller hotels should be concerned not just about their security but also by ransomware, an increasingly favorable tactic to extort hoteliers by hackers who encrypt the hotels data making it inaccessible until ransom is paid for. I believe hotels need a toolbelt of various securtiy technologies that can be used to prevent future malicious attacks. I think by managing and implementing a firewall is essential which helps get rid of dangerous traffic from coming onto the network and preventing sensitive data from being hacked.
  • ...1 more comment...
  •  
    This article talks about the weakness and vulnerability of POS systems involving safety. It mentions the security breach that few companies, such as Starwood Hotels & Resorts Worldwide (including their Westin, Sheraton and W Hotel brands), Hilton, Hyatt and the Trump Hotel, faced last year (2016) involving credit card fraud and identity theft through their POS systems. It mentions how point-of-sale (POS) systems are not complete safe and how vulnerable they are because they are constantly in use and aren't always patched, updated, or protected from vulnerabilities as frequently as required. It suggests that enterprises should outsource their cyber security management to minimize costs, considering that is extremely expensive to hire and retain IT security team.
  •  
    MOD 10: This article discusses the main tactics of cyber hackers that target hotels. Point of sale (POS) systems are easy targets for hackers due to their constant use during operation hours and because of that their security measures aren't always up to date. Hotels have large data banks since they're storing consumer profile information such as home addresses, phone numbers and credit card numbers. There's a large risk when it comes to security breaches within franchises because they have access to their parent company's regional, national and global systems. If their systems are hacked and breached, then that puts the whole system of the brand at risk. Security breaches within a system can also damage a brands reputation with the public. According to the article, "Recent major breaches at Fortune 500 companies and household names across the retail, restaurant and hotel sectors demonstrate that anti-virus, anti-malware and firewalls alone are not enough to secure businesses from the ever-evolving threat landscape." Smaller properties are even at a greater risk because not only do they have to monitor their compliance with PCI but also monitoring their security systems for their database and PMS system. Some of the recommended software's that should be used by hotels looking to be proactive with their company's cyber security is File Integrity Monitoring(FIM), Unified Threat Management(UTM), and Security Information and Event Management(SIEM).
  •  
    This article explores the different tactics hotels should use after a cyber attack. The article mentions several different type of attacks such as Phishing when hackers trick customers into giving up their login credentials. Ransomware, when hackers encrypt data making it unusable and inaccessible for the hotel. Not one solution but rather companies should be equipped with a series of technologies from firewalls to file monitoring programs. Some of these technologies, like SIEM requires an intelligent IT team to have the capabilities of analyzing and monitoring the reports produced. This may be more difficult for smaller businesses to implement and maintain.
14More

Ransomware: One of Hospitality's Biggest Threats in 2017 | News | Hospitality Magazine ... - 0 views

  • attack made headlines for locking guests out for their rooms
  • discuss how ransomware can affect the hospitality industry and what hotels and restaurants should consider to protect themselves from future cyber attacks.
  • Travelers may be annoyed, but for the hotel, ransomware can be a major business disruption.
  • ...10 more annotations...
  • The cyber threat has been used to target a variety of businesses from hospitals to retailers and now the hospitality industry
  • , businesses need to always be ready for a breach. Every business should have an action plan in place to prevent their company from being the next victim of ransomware or any other cyber security threat.
  • pirated software, file attachments, web links, and suspicious emails.
  • important to act quickly by segmenting portions of the infected network and removing devices to try and prevent the problem from spreading.
  • best practices for any company to employ are regular backups and a tested disaster recovery plan
  • Using anti-malware software is a necessary start, but it will not stop everything – especially rogue software downloaded by employees
  • keep additional devices from being infected.
  • install ransomware protection
  • malicious software will continue to rise as businesses and consumers become more dependent on the internet for everyday needs.
  • it’s important that businesses take proactive steps to protect not only company data, but the overall integrity of the company network from hackers.
  •  
    The article discusses ransomware attacks on hospitality properties. A 2016 attack left guests locked out of their rooms but the threat could affect different areas of a hospitality business and cause significant disruption to their business. Properties need to be prepared for a security breach with an action plan to prevent cyber-attack. The article points out that it's important to act quickly to segment the network and try to prevent any new devices from being infected. Best practice recommends regular backups and a recovery plan, using anti malware software and being cautious with employee installed software. The most important thing a company can do is to be proactive and prepared for an attack.
19More

The Pros and Cons of IoT in the Hotel Industry | - 1 views

  • The Internet of Things is the network of physical objects embedded with electronics, software, sensors, and network connectivity enabling these objects to collect and exchange data.
  • “Third Wave of Innovation” following the Industrial Revolution and Internet Revolution.
  • The hotel industry has already started implementing IoT strategies into their properties to increase guest satisfaction, decrease unnecessary costs and labor, and increase productivity.
  • ...9 more annotations...
  • top five trends
  • IoT Drawbacks in Hospitality
  • cyber-attacks and security breaches
  • “a smart energy management system knows when a guest room is unoccupied and can automatically adjust the temperature to reduce energy consumption by as much as 20-45 percent,”
    • herzencortes
       
      Energy consumption is only one aspect where IoT can help, but more so, it will help in maintenance, sales, and overall guest experience in the hospitality industry
  • The Internet of Things is the network of physical objects embedded with electronics, software, sensors, and network connectivity enabling these objects to collect and exchange data.
    • herzencortes
       
      The internet of things is a fascinating concept, in the future it will help companies collect more data than ever and then in turn this data will be use to cater to guests and market to a much more specific market
  • Guest-room Automation
    • herzencortes
       
      Guest room automation, in my opinion is the next big thing. Today we see air conditioners that can turn off when guests leave rooms, lights that dim with natural lights, and televisions that turn on and off depending on guests being or not present
  • Predictive Maintenance – Predictive maintenance takes preventive maintenance one-step further by using sensor data to recognize hazardous trends and alert the appropriate maintenance engineer before the issue escalates.
    • herzencortes
       
      Predictive maintenance is imperative to keeping a property in shape. By including IoT labor costs and maintenance costs can be brought down
  • Mobile Engagement –
    • herzencortes
       
      Social media is king, andhaving data that allows for properties and other companies to target their posts can make the difference
  • Hyper-Personalization
    • herzencortes
       
      Particularly with high end properties, personalization is an important part of building a recurring client base and differentiation.
  •  
    More and more, hotels are using IoT (the Internet of Things) strategies. Just like we can use our phones to lock/unlock our house's front door, hotels can use different devices in their properties to boost a guest's satisfaction. Currently, some of the top IoT trends are: Guest-room automation, where a guest's room can change the temperature, switch on/off the lights, and do a few more personalizations around the room depending on whether or not a guest is currently in there; Predictive maintenance, where sensor data is used to prevent issues by recognizing dangerous trends and notifying maintenance before it gets worse; Mobile engagement, where guests can use their phones as room keys among other things; and Hyper-personalization, where rooms could remember a guest's room preferences (temp, lighting, tv channels, etc.) and then set up the room the same way the next time they stayed. However, the fact that all of this is internet-enabled means that there is also a significant risk of information being hacked into and stolen.
12More

GDS business can be a significant source of incremental bookings and increased margin f... - 0 views

  • Every hotelier knows the advantage of direct online bookings to their hotel. But there is more to direct than just bookings on your website booking engine.
  • At Bookassist our metasearch management team has delivered metasearch bookings growth of 130% in the first quarter of 2018 versus the last quarter of 2017 (see https://bookassist.org/company/testimonials/en/)
  • The GDS is a large computer network that represents a single point of entry to travel agents and travel sites worldwide
  • ...7 more annotations...
  • A 2017 study of more than 900 travel agents located throughout 52 countries revealed that travel agents are continuing to report a record use of the GDS for hotel reservations.
  • It’s important to note also that GDS corporate business typically delivers a quality customer that usually augments hotel F&B/C&B revenue using his employer expenses to wine and dine in the hotel, in contrast to leisure travellers who tend to spend outside the hotel.
  • Because of the fixed transaction fee element, calculation of the CPA of a GDS booking will depend on the hotel sale rate achieved and the length of stay.
  • For the individual hotelier, the requirements for applying to consortia or account managing their property on the GDS can be onerous.
  • RFP is “request for proposal”, where companies make the market aware of the volume of bednights they expect to need for the upcoming year.
  • GDS business can be a significant source of incremental bookings and increased margin.
  • It’s time to make sure that you are open for business on the GDS.
  •  
    Over the few years, travel agents are using booking through Global distribution systems. Hotels however are having to pay a 20% booking fee when people book through GDS. Travel agents are also now using Airbnb, and alternative booking, because they aren't seeing any commissions on them. GDS is a large computer network that represents a single point of entry to travel agents and meta search sites. GDS are heavily used in the business and corporate travel accounts. GDS corporate business typically delivers more revenue for hotels because business travelers usually eat and drink in the hotel, rather than travel outside the hotel and spend money. Travel agents use commissionable and non-commissionable booking that, where commissionable bookings must add typically 8-10% agency commission on top of the GDS fees. GDS can be a good source of incremental bookings and increase margins.
  •  
    Over the few years, travel agents are using booking through Global distribution systems. Hotels however are having to pay a 20% booking fee when people book through GDS. Travel agents are also now using Airbnb, and alternative booking, because they aren't seeing any commissions on them. GDS is a large computer network that represents a single point of entry to travel agents and meta search sites. GDS are heavily used in the business and corporate travel accounts. GDS corporate business typically delivers more revenue for hotels because business travelers usually eat and drink in the hotel, rather than travel outside the hotel and spend money. Travel agents use commissionable and non-commissionable booking that, where commissionable bookings must add typically 8-10% agency commission on top of the GDS fees. GDS can be a good source of incremental bookings and increase margins.
1More

Five Ways Brands Can Adapt For The Era Of E-Commerce - 0 views

  •  
    This article is very interesting because it talks about how establishments like Sports Authority and Toys 'R' Us are out of business due to e-commerce sites like amazon, ebay, Jet.com and others. It explains how businesses can adapt to an era of e-commerce. The first thing a business can do is to consolidate inventory, in other words have all the inventory in one single pool instead of different channels like brands have done before. The second thing is to establish a two-day shipping network, here the article explains how consumers expect immediate gratification with online orders. We see grocery stores doing this but with faster shipping within hours. The third thing one can do is leverage from an existing e-commerce channels for visibility. A business can sell its products on networks that are already established such as amazon, Jet.com and ebay. The fourth thing a business can do is use brick-and-mortar channels to increase exposure, meaning using physical stores such as Sports Authority and Toys 'R' Us to help increase exposure. It explains that drop shipping to these companies will help sales, 0% of all retail purchases still happen in physical stores. The final thing a business can do is use its resources. It is important to have an e-commerce expert on your payroll to grow the business online which will help in sales and stay on top of the this era. The article finishes by explaining that adaptability is the future of retail, which I believe adaptability is the future for any business. It is important to adapt and keep making things easier and more convenient for consumers.
13More

Using Mobile Event Apps as a Marketing Tool to Attract Event Planners , by Bob Vaez - 0 views

  • Today, however, new technology solutions such as mobile conference apps are on the top of mind for every event planner.
  • Destinations and properties can use mobile offerings as a new opportunity for a different type of relationship with event planers and to add value to their overall package and offerings.
  • this helps attendees manage the event schedule easier, enhance networking opportunities, interact with the event using audience response and navigate their way around the event and property right from their smartphones
  • ...8 more annotations...
  • Integrating partner technology relationships into our sales and marketing immediately increases our value in the eyes of potential business partners and ensures them that we understand their overall event goals and objectives."
  • She adds by highlighting that bringing new technologies to the table also helps with the sales process.
  • First is the opportunity to engage and educate potential clients (event organizers) looking to book meeting space and in the process forming a new relationship. The other is adding value to the overall hotel offering and building a stronger brand as well as increasing revenue.
  • Organizers benefit greatly when a destination offers additional marketing and event execution tools, which assist when positioning the experience to event stakeholders and decision makers. In addition having a technology relationship in place, saves the organizer time and money, by having pre-populated destination details and potential purchaser discounts."
  • It gives them an opportunity to experiment how audience response with smartphones work or how they can send conference updates and alerts to delegates faster and easier with mobile event apps.
  • If possible it would also be extremely beneficial to offer a demo or a free basic version of the technology to allow event planners experience and try a simple mobile event app before exposing or upselling them to the more advanced features.
  • Mixing technology promotion by Hotels is not a usual practice but it is becoming more mainstream.
  • It is also important to closely measure the ROI for any technology strategy such as offering mobile event apps as part of the experience at a hotel. The key measurement factors will be feedback from attendees and event planners as well as tracking how many event planners opt-in to use this technology for their events.
  •  
    This article talks about how hotels can use mobile event apps to attract event planners. Hotels can use these apps to not only add value to their offerings, but also set themselves apart from the competition. These mobile apps provide information on the meeting agenda, speakers, and hotel details to all attendees. Mobile event apps are beneficial to the event planners because the apps help facilitate communication, offer networking opportunities, and improve the overall digital experience. Hotels are able to move away from traditional meetings and offer planners something more, something intangible that will contribute to the event's overall success.
  •  
    The article introduces the benefit of using mobile event apps as a marketing tool. It is not a usual practice to mix technology promotion by hotels yet but it is becoming more mainstream. Destinations and properties can use mobile offerings as a marketing and sales tools to attract more event planner. It makes easier to organize the event more effectively and enhance the networking opportunities for attendees. Thus, properties will gain benefits greatly in terms of positioning and promotion of the services or facilities inside the business as a marketing tool. For example, mobile app can include the information about event and property service details, which will facilitate on-site communication and advertise hotel services via the app. It will, in turn, make the overall digital experience for attendees outstanding. As a measurement of success, properties can monitor ROI for new technology through feedback from attendees and event planners, and the number of events adapting mobile app.
11More

Hospitality: Shelter Your Business from Advanced Cyber Threats | Hospitality Technology - 0 views

  • According to Verizon’s 2017 Data Breach Investigations Report, accommodation was the top industry for point-of-sale intrusions.
  • Hospitality, whether hotels or restaurants, transact more credit cards than almost any other industry, making them an extremely attractive target.
  • The hospitality industry’s rapid push to digitalization means that it is still playing catch-up on the security front.
  • ...7 more annotations...
  • The 2017 Lodging Technology Study by Hospitality Technology found that 74% of hotels do not have breach protection and less than half use end-to-end encryption for cardholder data or use tokenization at the card swipe.
  • PoS systems are a weak security point for many networks as they are in constant use and often are not patched or updated.
  • Denial-of-Service attacks make up approximately 20% of hospitality cyber incidents.
  • Early detection is key to controlling attack costs and reputation damage.
  • Host- and network-based firewalls should be used as the first part of a layered security approach.
  • A good endpoint prevention stack consists of an antivirus solution to handle known threats and a prevention layer that effectively prevents unknown, advanced attacks.
  • No technology, however, can substitute for an overall culture of security.
  •  
    The article describes the main cyber threats that the hospitality companies face. Over past few years, nearly every major hotel group has been attacked. The same is true for the F&B industry. One of the reasons for that is that the hospitality companies are the ones that process credit card information more than in any other industries. Moreover, hotels and restaurants have many access points for the malware: from wifi networks to POS's. The attackers may also use the third party suppliers (for example, OTA's) to access the hotels' systems. Verizon 2017 Security Payment Report states that less than a half of all hospitality businesses have full credit card payment security compliance. The main type of the attack is POS intrusion. Denial-of-Service Attacks constitute about 20% of the total number. Although they are not so dangerous in terms of sensitive information, they can disturb the company's operations causing significant losses as well. Thus, the hotels and restaurants need to invest in early detection protection provided by the effective firewalls and antiviruses. However, it is also very important to understand that no technology may ever fully substitute the security culture of the company's employees. Many attacks are conducted due to the personal weaknesses of the associates answering the calls, for example. So, in my opinion, in addition to the cyber security systems, there should be appropriate personnel training as well as well elaborated procedure protocols.
11More

Stopping Data Breaches in Hospitality | Impact Networking - 0 views

  • Nearly half of all cyberattacks target SMBs, a number which is expected to increase.
  • Human error is the number one cause of data breaches from cyberattacks, with 52% of incidents directly attributable to them.
  • The majority of attacks that occur within businesses happen because somewhere along the line, someone made a mistake. Perhaps they opened an attachment they shouldn’t have or visited a risky website.
  • ...7 more annotations...
  • 93% of companies without a disaster recovery plan who suffer a major data disaster are out of business within one year.
  • SMBs simply don’t have the resources to survive breaches and are risking their entire business by not fully preparing against attacks.
  • Research suggests that 70% of consumers would stop doing business with a company if it experienced a data breach.
  • even for businesses who can survive a breach and save their data, long-term consequences can be dire.
  • Consider a true next-gen antivirus for everyone under your network to minimize the potential for attack.
  • By keeping all your data periodically backed up in secure data centers, you can rest a lot more easily knowing that should the worst happen, you can respond quickly and effectively.
  • One of the most effective ways of counteracting the dangers of cyberthreats is by training employees and establishing policies around a security strategy.
  •  
    This article describes the destructive effects of cyber attacks on enterprises, especially small and medium-sized enterprises. Because it does not have sufficient prevention and sufficient resources for disaster recovery. The most direct cause of current cyber attacks is that people open some risky websites or emails in the wrong place. For the hospitality industry, there is a large amount of customer privacy and sensitive information. Once attacked, its destructiveness is unimaginable. And to protect consumer data, most service industries just comply with local state laws, but most state laws have not made greater progress in information protection. Therefore, enterprises should protect themselves and their customers from cyber threats from the three aspects of their own network endpoints, disaster recovery and education.
10More

Recent Trends in Event Management - 1 views

  • Recent Trends in Event Management
  • meetings and events this year is the introduction of Smartphone technology to business.
  • Publicis Meetings USA (PMUSA), revealed that the trend of using technology in meeting or event management will drive in forward, thanks to the increasing tech-savvy clients.
  • ...5 more annotations...
  • “Technological advances continue to be increasingly important and are leading to more requests for customization and interactivity in meetings and events…We expect technology to be at the core of several trends in the meetings industry in 2011."
  • Through the use of various mobile applications for event management, it becomes easier for the event managers and the producers to promote audience engagement, interactivity, and business-to-customer networking.
  • Today the trend of using mobile applications for event management has led the Smartphones to increase the technological and interactive aspects of a meeting or an event. There are various audience response and networking apps that helps in accomplishing tasks like customizing program agendas, and messaging.
  • The entrepreneurs and event managers have a coined the term “hybrid meetings” for the type of event management that comprises both the elements of a live meeting and a conference via the Internet.
  • With the use of applications like the Windows mobile apps, your Smartphone can be transformed into a hand-held PC.
  •  
    This article is an interesting one, highlighting the changes in trends in Event Management. The article starts off by explaining that the major changes in the meeting and planning areas of a business is due to the introduction of the smartphone technology in the business. It goes on the explain that there are mobile applications used just for events. It seems that the more that people and businesses become aware of the use of the mobile device as it relates to technology, it will make it even easier to customize and request different things for an event. Technology will be the core to different and new trends in the meeting and planning areas of businesses. It evident that the use of different mobile applications will make every thing easier for event managers. It allows managers to communicate with their customers and understand what exactly it is they need.
  •  
    This article looks at the rising use of Smartphones and smartphone apps for the event planning industry, and more specifically at industry meetings. The use of the technology makes it easier to connect the audience on points like engagement, interactivity, and business-to-customer- networking. As the importance of social media interaction in business, so does the need for interaction between business leaders increase as well, and helps to create a successful marketing event.
7More

E-commerce - Technology and business - Edexcel - GCSE Business Revision - Edexcel - BBC... - 0 views

shared by kburn039 on 13 Sep 20 - No Cached
  • E-commerce, or electronic commerce, refers to the buying and selling of products and services using devices connected to an electronic network, such as the internet.Three things are required for e-commerce to take place:a seller who has products and services that are displayed electronicallya buyer who has the equipment required to view the seller’s products and services, and a means of paying for thema network that enables information and payment to be exchanged by the buyer and seller
    • kburn039
       
      Could be a business, private party, third party, or family member.
  • E-commerce, or electronic commerce, refers to the buying and selling of products and services using devices connected to an electronic network, such as the internet.Three things are required for e-commerce to take place:a seller who has products and services that are displayed electronicallya buyer who has the equipment required to view the seller’s products and services, and a means of paying for thema network that enables information and payment to be exchanged by the buyer and seller
  • Disadvantages of e-commerce
    • kburn039
       
      A disadvantage that sums the four up is the loss of jobs due to technology taking over.
  • ...1 more annotation...
  • Advantages of e-commerce
    • kburn039
       
      E-Commerce has multiple benefits that will allow businesses to profit more with the numbers of technology use increasing every day.
8More

protel to launch world's first PMS for the iPad - 4 views

  • Hotels can use iPads as "floating front desks", offering guests mobile services like check-in or check-out. iPads could even be employed as support work stations to reduce demand peaks.
  • Hotels can use iPads as "floating front desks", offering guests mobile services like check-in or check-out. iPads could even be employed as support work stations to reduce demand peaks.
  • Benefits for the user: Additional hardware and installations in the hotel are unnecessary as the sole requirement is an Internet browser.
  • ...2 more annotations...
  • Data security is also taken care of by protel. With its extended range of functionalities and based on the latest technology, this easily scalable cloud application is the perfect solution for all hotels who value flexibility, reliability and security.
  • With protel Voyager protel presented a mobile app for hotel guests.
  •  
    The article reveals how tablet devices offer many advantages to hotels, because many business processes become more and more independent of location. Allowing your employees to work more effective is the main objective for the hospitality and tourism business. A few examples: Hotels can use iPads as "floating front desks", offering guests mobile services like check-in or check-out. iPads could even be employed as support work stations to reduce demand peaks. The ability to having a floating front desk and being able to accomodate guest is beneficial." The app offers access to guest relevant functions of the property management system like booking services. It also offers access to location based services, advertising local events and facilities, and to the hotel's social networking sites" Having the application to allow guest to have 24 hour service is a convenience comparable to none.
  •  
             This article introduce us a new hotel software technology, the iPad property management system. Nowadays the table devices offer many advantages to hotel. Ipad is a good example for the table device use in hospitality industry. A German company design a PMS on iPad for hotel, its name is protel Air. Use this device, hotel can provide the mobile service like check-in and check-out to support the employee's job. Protel Air is a full-service solution and a true "Software-as-a-Service" application, that is hosted in a secure data centre environment. The only requirement of this device is the Internet; it can update and maintain the date through Internet. It also protects the data by its security system. They also design an application called protel Voyager for guests. It offers access to location based services, advertising local events and facilities, and to the hotel's social networking sites. The protel Voyager will encourage guests to report positive feedback.          I think to use new technology to help the operation of hotel is a good idea. Even it will cost some money to purchase the equipment and training the employee. It will save time for the employee especially in the peak season. My only concern is the app for guests. Guests may not use to this kind of new technology. They prefer the human service more. But it is worth to try.  
  •  
    German protel hotelsoftware presented the world's first property management system for the iPad. The tablet devices give hotel a lot of benefits.  It helps the hotel reduce demand peaks, and offer guests more convenience. Protel doesn't need the support of additional hardware and installation. it can run in the internet browser. One of Protel's product is Protel Voyager, which is designed as a web app, the customers do not need to install this app, because it can runs in the mobile browser. It offers access to guest relevant unctions of the property management system like booking services. It also offers access to location based services, advertising local events and facilities, and to the hotel's social networking sites such as Twitter, Facebook or You Tube.  
28More

E-Business: The New Management Challenge - A Peer-Reviewed Academic Articles | GBR - 2 views

  • The Internet is turning business upside down and inside out.
  • This article will examine the roots of this e-business movement and the key challenges it creates for managers who must move rapidly to adapt to the new competitive forces of the network era.
  • Fed-Ex was an early mover in implementing this concept when it initiated the service that allowed customers to track their packages on the Web.
  • ...23 more annotations...
  • E-business is an evolutionary step in the convergence of the business process redesign movement
  • “anytime, anywhere;”
    • anonymous
       
      Tis is defiantly the mentality of people raised around technology. If I can't get what I want , when I want, then I DO NOT WANT IT.
  • lowering inventory costs and eliminating the risk of stale products on the retailers’ shelves.
  • The Web now provides a new channel of distribution that allows producers who formerly had to go through retailers to reach the end user directly.
  • new online stores have, in turn, increased demand and the number of users, putting pressure on traditional retailers to create an e-commerce presence as well.
  • Management Issues
  • Developing a corporate climate for adapting to the network era.Understanding customer expectations.Analyzing the firm’s ability to manage information technology.Recognizing the time frame in which these changes must be made
  • By linking retail data directly to the manufacturing site
  • new pragmatic issues to address
  • Providing security for the customer is crucial,
  • benefits include the option of developing a number of applications concurrently instead of being limited to in-house resources
  • the Net is giving rise to numerous “infomediaries” – some of whom play the role of “information broker” or “market maker” and others who perform information-handling tasks.
  • eWallet acts as an information-handler by providing online purchasers a way to automatically provide their information to any vendor.
  • almost all E-business success stories are characterized by new ventures whose founders recognized the vulnerability of going concerns that were not adapting to these opportunities.
  • E-commerce continues to expand consumer choice by providing the tools for them to switch suppliers instantaneously, including the ability to quickly and easily make price comparisons.
  • Web technology is characterized by rapid breakthroughs in software and hardware.
  • application solution providers (ASPs) who offer an opportunity for firms to outsource their IT management.
  • Fraud is higher in cyberspace than in traditional retail and harder to detect.
  • experience with Internet initiatives has been the urgency to develop and implement competitive Web strategies.
  • Similarly, Barnes and Noble took a “wait and see attitude” toward Amazon and now finds itself having great difficulty in increasing its market share of Web sales.
  • the cost barrier to entry in the web market is virtually zero
  • small new companies do not have a formal infrastructure through which strategic ideas get squandered.
  • The management task is to leverage these opportunities quickly to sustain or enhance competitive advantage.
  •  
    This article talks about the importance of having an online presence. It is imperative that businesses leverage their business opportunities online before they are gone. It talks about key issues managers deal with during this network era. Such as "understanding customer expectations", "analyzing a firm's ability to manage information technology" and moving quickly enough to implement the changes necessary to actually benefit the company. In 2020, if businesses do not have an online presence they might as well not exist. Especially when customers have a "right now" mentality. This article helped me understand the issues that are arising with companies not being involved in e-business.
15More

Protecting the Hospitality Sector With Security Intelligence - 1 views

  • A decade ago in 2009, hospitality was — by some reports — the most widely attacked industry of all. And while other industries have now surpassed it, a 2019 report by Trustwave still ranks hospitality as the third most-breached industry, accounting for 10% of all breaches.
  • the average hospitality data breach costs $1.99 million to contain, at a cost per record of $123. These high costs are due in part to the time needed to adequately respond to a breach. On average, it takes 200 days to identify a hospitality data breach and a further 75 days to contain it
  • attacks targeting the hospitality industry are mostly aimed at stealing payment card data.
  • ...10 more annotations...
  • Why Is Hospitality So Hard to Secure?
  • 1. They often have large, complex networks.
  • 2. Customers are onsite — and attackers could be too.
  • 3. Staff churn.
  • 4. Franchising.
  • 5. Third-party risk.
  • Protecting the hospitality industry from cyber threats isn’t an easy job. Security professionals in the industry are tasked with defending highly complex networks with many endpoints against a constant barrage of attacks and a constantly churning workforce. On top of all of that, they have limited security resources to work with.
  • Comprehensive security intelligence helps security teams identify unknown threats to the organization, and make informed decisions about how and where to allocate time and resources for maximum effect.
  • Threat intelligence provides the context analysts need to quickly distinguish between valuable alerts and false positives, drastically improving their ability to respond to genuine cyber threats.
  • Threat intelligence can help security teams drastically reduce the time needed to identify and contain a breach by alerting them the moment stolen assets (e.g., guest or passenger data) are made available for sale via the dark web.
  •  
    (1 of 2) "The hospitality sector has always been a popular target for cyberattacks." This is the first line of this Recorded Future article published in January. The article discusses breaches that happened for both Marriott and British Airways and how this is a regular occurrence in the industry as it is such a big target with so many possible points that can be attacked. While the statistics for the hospitality industry have improved greatly in the last decade, in 2019, they were still accounting for 10% of all breaches. Not only does a breach affect the way an organization operates, but also it also severely effects their bottom-line and takes quite a but of time for them to recover. "According to Ponemon's 2019 Cost of a Data Breach Report, the average hospitality data breach costs $1.99 million to contain, at a cost per record of $123. These high costs are due in part to the time needed to adequately respond to a breach. On average, it takes 200 days to identify a hospitality data breach and a further 75 days to contain it." The article continues by stating that hackers are typically seeking payment card data when compromising the hospitality industry.
  •  
    (2 of 2) The article then discusses the many reasons why it is so difficult for hospitality-oriented companies to secure their assets versus other organizations of similar stature. Some of these reasons include the large, complex networks which are typically publicly accessible and contain many customers in the databases, the fact that customers are always onsite and so are attackers, the high turnover leading to inconsistent training and sharing of credentials, franchisers owning the responsibility of security yet not knowing much about it, and the risk associated with all of the various third parties the hotels do business with. While intelligence has come a very long, "security professionals in the industry are tasked with defending highly complex networks with many endpoints against a constant barrage of attacks and a constantly churning workforce… [AND] they have limited security resources to work with." Comprehensive security intelligence systems are now capable of protecting many aspects of the organization. Some of these updated features include responding rapidly to security incidents, blocking online brand abuse and impersonation, managing third-party risk, reducing breach containment times, and better allocating security resources. Property data security is so important to the hospitality industry. If a business does not take the proper precautions to protect their systems and their customers, then it could lead to a devastating event for the business. While security intelligence has progressed within the last decade, a business needs to make sure that they have chosen a reliable agent to partner with who will produce consistent service. If the business keeps up with their system updates and protections, they should not have to worry about their security system failing.
11More

Cloud Computing Trends & Future Technology 2021 | Datamation - 1 views

  • Enterprise leaders are quickly recognizing that not all clouds work for all of their needs, and some of their legacy systems and applications work better on their existing on-premises infrastructure. These realizations, and a growing need for both flexibility and reliable security, have ushered in a period of growth for hybrid and multicloud setups. 
  • which polled more than 2,600 global IT decision-makers globally – and highlighted that hybrid cloud is now the most common choice, with 46% of respondents now using a hybrid cloud (a 12% increase since their previous survey).
  • Instead of relying on embedded, native security features, tech experts are advocating for the increased use of managed security service providers (MSSPs) and a better organizational policy for user access management. Organizations are recognizing that security incidents can come from both internal accidents and external actors, so it’s important that all users are trained and compliant with an organization’s security policies.
  • ...7 more annotations...
  • By implementing the ZTNA model for secure network access, IT teams can have full control over who is granted access, enters, and leaves the network at all times. This model has gained much more recognition since being mandated in President Biden’s executive order.”
  • The entire world is starting to shift its attention to Kubernetes and the orchestration of containers,” Cusimano said. “It’s the next iterative shift — we went from physical to virtual to cloud, and now we’re going to microservices and containers. 
  • “Cloud-native technologies will also lead and help companies to build, migrate, and modernize customer-facing and analytics and artificial intelligence (AI) apps more easily and at scale.”
  • cloud is typically more energy efficient than on-premises infrastructure, the growth of AI and the Internet of Things (IoT) is causing cloud technology to work harder than ever.
  • “Sustainability is a massive trend in IT – from enterprises seeking to ensure cloud providers leverage renewable energy in data centers to enterprises increasingly seeking to minimize their own supply carbon footprint via sustainably sourced, circular IT solutions,” Fenn said.
  • Although few cloud vendors have adopted the circular model, most are changing their business models to emphasize more renewable energy use, carbon offsets, and data center efficiency boosts.
    • cingram21
       
      This article discussed the five major trends and developments in cloud computing. The first point explains how there was a big trend towards cloud-only computing and away from on-premise infrastructure. We are realizing this isn't always the the best scenario and that a hybrid model allows for an enterprise to operate data-intensive processes while taking advantage of tech advancements associated with cloud computing. The second trend is utilizing "managed security service providers (MSSPs). This is because security is important to control both internally and externally. It also mentions "Zero-Trust Network Access" as a new executive order issued by President Biden. The third section discusses Kubernetes (Further research explained this is an open-source system for automating deployment, scaling, and management of containerized applications.) Kubernetes is also known as "K8s." This is a large shift from physical on-site infrastructure to "containers." This is packaging software for the deployment and the sharing of technology. The reason this is a trend is because it is cost-effective and improves performance. The final major trend is sustainability efforts. Cloud technology is more energy-efficient than on-site infrastructure, but advancements in (IoT) is causing significant growth and use of cloud tech which requires increased energy consumption. Cloud vendors are changing to ensure they are using renewable energy, carbon offsets, and data center efficiency. The most interesting part of this to me is the Kubernetes and Containerization as I have yet to read or hear anything about this. Open source is always interesting. The story behind K8's being developed by Google and now an independent foundation is good for our society and a good trend.
    • cingram21
       
      This article discussed the five major trends and developments in cloud computing. The first point explains how there was a big trend towards cloud-only computing and away from on-premise infrastructure. We are realizing this isn't always the the best scenario and that a hybrid model allows for an enterprise to operate data-intensive processes while taking advantage of tech advancements associated with cloud computing. The second trend is utilizing "managed security service providers (MSSPs). This is because security is important to control both internally and externally. It also mentions "Zero-Trust Network Access" as a new executive order issued by President Biden. The third section discusses Kubernetes (Further research explained this is an open-source system for automating deployment, scaling, and management of containerized applications.) Kubernetes is also known as "K8s." This is a large shift from physical on-site infrastructure to "containers." This is packaging software for the deployment and the sharing of technology. The reason this is a trend is because it is cost-effective and improves performance. The final major trend is sustainability efforts. Cloud technology is more energy-efficient than on-site infrastructure, but advancements in (IoT) is causing significant growth and use of cloud tech which requires increased energy consumption. Cloud vendors are changing to ensure they are using renewable energy, carbon offsets, and data center efficiency. The most interesting part of this to me is the Kubernetes and Containerization as I have yet to read or hear anything about this. Open source is always interesting. The story behind K8's being developed by Google and now an independent foundation is good for our society and a good trend.
« First ‹ Previous 161 - 180 of 768 Next › Last »
Showing 20 items per page