Skip to main content

Home/ Hospitality Technology/ Group items matching "networking." in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
8More

protel to launch world's first PMS for the iPad - 4 views

  • Hotels can use iPads as "floating front desks", offering guests mobile services like check-in or check-out. iPads could even be employed as support work stations to reduce demand peaks.
  • Hotels can use iPads as "floating front desks", offering guests mobile services like check-in or check-out. iPads could even be employed as support work stations to reduce demand peaks.
  • Benefits for the user: Additional hardware and installations in the hotel are unnecessary as the sole requirement is an Internet browser.
  • ...2 more annotations...
  • Data security is also taken care of by protel. With its extended range of functionalities and based on the latest technology, this easily scalable cloud application is the perfect solution for all hotels who value flexibility, reliability and security.
  • With protel Voyager protel presented a mobile app for hotel guests.
  •  
    The article reveals how tablet devices offer many advantages to hotels, because many business processes become more and more independent of location. Allowing your employees to work more effective is the main objective for the hospitality and tourism business. A few examples: Hotels can use iPads as "floating front desks", offering guests mobile services like check-in or check-out. iPads could even be employed as support work stations to reduce demand peaks. The ability to having a floating front desk and being able to accomodate guest is beneficial." The app offers access to guest relevant functions of the property management system like booking services. It also offers access to location based services, advertising local events and facilities, and to the hotel's social networking sites" Having the application to allow guest to have 24 hour service is a convenience comparable to none.
  •  
             This article introduce us a new hotel software technology, the iPad property management system. Nowadays the table devices offer many advantages to hotel. Ipad is a good example for the table device use in hospitality industry. A German company design a PMS on iPad for hotel, its name is protel Air. Use this device, hotel can provide the mobile service like check-in and check-out to support the employee's job. Protel Air is a full-service solution and a true "Software-as-a-Service" application, that is hosted in a secure data centre environment. The only requirement of this device is the Internet; it can update and maintain the date through Internet. It also protects the data by its security system. They also design an application called protel Voyager for guests. It offers access to location based services, advertising local events and facilities, and to the hotel's social networking sites. The protel Voyager will encourage guests to report positive feedback.          I think to use new technology to help the operation of hotel is a good idea. Even it will cost some money to purchase the equipment and training the employee. It will save time for the employee especially in the peak season. My only concern is the app for guests. Guests may not use to this kind of new technology. They prefer the human service more. But it is worth to try.  
  •  
    German protel hotelsoftware presented the world's first property management system for the iPad. The tablet devices give hotel a lot of benefits.  It helps the hotel reduce demand peaks, and offer guests more convenience. Protel doesn't need the support of additional hardware and installation. it can run in the internet browser. One of Protel's product is Protel Voyager, which is designed as a web app, the customers do not need to install this app, because it can runs in the mobile browser. It offers access to guest relevant unctions of the property management system like booking services. It also offers access to location based services, advertising local events and facilities, and to the hotel's social networking sites such as Twitter, Facebook or You Tube.  
28More

E-Business: The New Management Challenge - A Peer-Reviewed Academic Articles | GBR - 2 views

  • The Internet is turning business upside down and inside out.
  • This article will examine the roots of this e-business movement and the key challenges it creates for managers who must move rapidly to adapt to the new competitive forces of the network era.
  • Fed-Ex was an early mover in implementing this concept when it initiated the service that allowed customers to track their packages on the Web.
  • ...23 more annotations...
  • E-business is an evolutionary step in the convergence of the business process redesign movement
  • “anytime, anywhere;”
    • anonymous
       
      Tis is defiantly the mentality of people raised around technology. If I can't get what I want , when I want, then I DO NOT WANT IT.
  • lowering inventory costs and eliminating the risk of stale products on the retailers’ shelves.
  • The Web now provides a new channel of distribution that allows producers who formerly had to go through retailers to reach the end user directly.
  • new online stores have, in turn, increased demand and the number of users, putting pressure on traditional retailers to create an e-commerce presence as well.
  • Management Issues
  • Developing a corporate climate for adapting to the network era.Understanding customer expectations.Analyzing the firm’s ability to manage information technology.Recognizing the time frame in which these changes must be made
  • By linking retail data directly to the manufacturing site
  • new pragmatic issues to address
  • Providing security for the customer is crucial,
  • benefits include the option of developing a number of applications concurrently instead of being limited to in-house resources
  • the Net is giving rise to numerous “infomediaries” – some of whom play the role of “information broker” or “market maker” and others who perform information-handling tasks.
  • eWallet acts as an information-handler by providing online purchasers a way to automatically provide their information to any vendor.
  • almost all E-business success stories are characterized by new ventures whose founders recognized the vulnerability of going concerns that were not adapting to these opportunities.
  • E-commerce continues to expand consumer choice by providing the tools for them to switch suppliers instantaneously, including the ability to quickly and easily make price comparisons.
  • Web technology is characterized by rapid breakthroughs in software and hardware.
  • application solution providers (ASPs) who offer an opportunity for firms to outsource their IT management.
  • Fraud is higher in cyberspace than in traditional retail and harder to detect.
  • experience with Internet initiatives has been the urgency to develop and implement competitive Web strategies.
  • Similarly, Barnes and Noble took a “wait and see attitude” toward Amazon and now finds itself having great difficulty in increasing its market share of Web sales.
  • the cost barrier to entry in the web market is virtually zero
  • small new companies do not have a formal infrastructure through which strategic ideas get squandered.
  • The management task is to leverage these opportunities quickly to sustain or enhance competitive advantage.
  •  
    This article talks about the importance of having an online presence. It is imperative that businesses leverage their business opportunities online before they are gone. It talks about key issues managers deal with during this network era. Such as "understanding customer expectations", "analyzing a firm's ability to manage information technology" and moving quickly enough to implement the changes necessary to actually benefit the company. In 2020, if businesses do not have an online presence they might as well not exist. Especially when customers have a "right now" mentality. This article helped me understand the issues that are arising with companies not being involved in e-business.
15More

Protecting the Hospitality Sector With Security Intelligence - 1 views

  • A decade ago in 2009, hospitality was — by some reports — the most widely attacked industry of all. And while other industries have now surpassed it, a 2019 report by Trustwave still ranks hospitality as the third most-breached industry, accounting for 10% of all breaches.
  • the average hospitality data breach costs $1.99 million to contain, at a cost per record of $123. These high costs are due in part to the time needed to adequately respond to a breach. On average, it takes 200 days to identify a hospitality data breach and a further 75 days to contain it
  • attacks targeting the hospitality industry are mostly aimed at stealing payment card data.
  • ...10 more annotations...
  • Why Is Hospitality So Hard to Secure?
  • 1. They often have large, complex networks.
  • 2. Customers are onsite — and attackers could be too.
  • 3. Staff churn.
  • 4. Franchising.
  • 5. Third-party risk.
  • Protecting the hospitality industry from cyber threats isn’t an easy job. Security professionals in the industry are tasked with defending highly complex networks with many endpoints against a constant barrage of attacks and a constantly churning workforce. On top of all of that, they have limited security resources to work with.
  • Comprehensive security intelligence helps security teams identify unknown threats to the organization, and make informed decisions about how and where to allocate time and resources for maximum effect.
  • Threat intelligence provides the context analysts need to quickly distinguish between valuable alerts and false positives, drastically improving their ability to respond to genuine cyber threats.
  • Threat intelligence can help security teams drastically reduce the time needed to identify and contain a breach by alerting them the moment stolen assets (e.g., guest or passenger data) are made available for sale via the dark web.
  •  
    (1 of 2) "The hospitality sector has always been a popular target for cyberattacks." This is the first line of this Recorded Future article published in January. The article discusses breaches that happened for both Marriott and British Airways and how this is a regular occurrence in the industry as it is such a big target with so many possible points that can be attacked. While the statistics for the hospitality industry have improved greatly in the last decade, in 2019, they were still accounting for 10% of all breaches. Not only does a breach affect the way an organization operates, but also it also severely effects their bottom-line and takes quite a but of time for them to recover. "According to Ponemon's 2019 Cost of a Data Breach Report, the average hospitality data breach costs $1.99 million to contain, at a cost per record of $123. These high costs are due in part to the time needed to adequately respond to a breach. On average, it takes 200 days to identify a hospitality data breach and a further 75 days to contain it." The article continues by stating that hackers are typically seeking payment card data when compromising the hospitality industry.
  •  
    (2 of 2) The article then discusses the many reasons why it is so difficult for hospitality-oriented companies to secure their assets versus other organizations of similar stature. Some of these reasons include the large, complex networks which are typically publicly accessible and contain many customers in the databases, the fact that customers are always onsite and so are attackers, the high turnover leading to inconsistent training and sharing of credentials, franchisers owning the responsibility of security yet not knowing much about it, and the risk associated with all of the various third parties the hotels do business with. While intelligence has come a very long, "security professionals in the industry are tasked with defending highly complex networks with many endpoints against a constant barrage of attacks and a constantly churning workforce… [AND] they have limited security resources to work with." Comprehensive security intelligence systems are now capable of protecting many aspects of the organization. Some of these updated features include responding rapidly to security incidents, blocking online brand abuse and impersonation, managing third-party risk, reducing breach containment times, and better allocating security resources. Property data security is so important to the hospitality industry. If a business does not take the proper precautions to protect their systems and their customers, then it could lead to a devastating event for the business. While security intelligence has progressed within the last decade, a business needs to make sure that they have chosen a reliable agent to partner with who will produce consistent service. If the business keeps up with their system updates and protections, they should not have to worry about their security system failing.
11More

Cloud Computing Trends & Future Technology 2021 | Datamation - 1 views

  • Enterprise leaders are quickly recognizing that not all clouds work for all of their needs, and some of their legacy systems and applications work better on their existing on-premises infrastructure. These realizations, and a growing need for both flexibility and reliable security, have ushered in a period of growth for hybrid and multicloud setups. 
  • which polled more than 2,600 global IT decision-makers globally – and highlighted that hybrid cloud is now the most common choice, with 46% of respondents now using a hybrid cloud (a 12% increase since their previous survey).
  • Instead of relying on embedded, native security features, tech experts are advocating for the increased use of managed security service providers (MSSPs) and a better organizational policy for user access management. Organizations are recognizing that security incidents can come from both internal accidents and external actors, so it’s important that all users are trained and compliant with an organization’s security policies.
  • ...7 more annotations...
  • By implementing the ZTNA model for secure network access, IT teams can have full control over who is granted access, enters, and leaves the network at all times. This model has gained much more recognition since being mandated in President Biden’s executive order.”
  • The entire world is starting to shift its attention to Kubernetes and the orchestration of containers,” Cusimano said. “It’s the next iterative shift — we went from physical to virtual to cloud, and now we’re going to microservices and containers. 
  • “Cloud-native technologies will also lead and help companies to build, migrate, and modernize customer-facing and analytics and artificial intelligence (AI) apps more easily and at scale.”
  • cloud is typically more energy efficient than on-premises infrastructure, the growth of AI and the Internet of Things (IoT) is causing cloud technology to work harder than ever.
  • “Sustainability is a massive trend in IT – from enterprises seeking to ensure cloud providers leverage renewable energy in data centers to enterprises increasingly seeking to minimize their own supply carbon footprint via sustainably sourced, circular IT solutions,” Fenn said.
  • Although few cloud vendors have adopted the circular model, most are changing their business models to emphasize more renewable energy use, carbon offsets, and data center efficiency boosts.
    • cingram21
       
      This article discussed the five major trends and developments in cloud computing. The first point explains how there was a big trend towards cloud-only computing and away from on-premise infrastructure. We are realizing this isn't always the the best scenario and that a hybrid model allows for an enterprise to operate data-intensive processes while taking advantage of tech advancements associated with cloud computing. The second trend is utilizing "managed security service providers (MSSPs). This is because security is important to control both internally and externally. It also mentions "Zero-Trust Network Access" as a new executive order issued by President Biden. The third section discusses Kubernetes (Further research explained this is an open-source system for automating deployment, scaling, and management of containerized applications.) Kubernetes is also known as "K8s." This is a large shift from physical on-site infrastructure to "containers." This is packaging software for the deployment and the sharing of technology. The reason this is a trend is because it is cost-effective and improves performance. The final major trend is sustainability efforts. Cloud technology is more energy-efficient than on-site infrastructure, but advancements in (IoT) is causing significant growth and use of cloud tech which requires increased energy consumption. Cloud vendors are changing to ensure they are using renewable energy, carbon offsets, and data center efficiency. The most interesting part of this to me is the Kubernetes and Containerization as I have yet to read or hear anything about this. Open source is always interesting. The story behind K8's being developed by Google and now an independent foundation is good for our society and a good trend.
    • cingram21
       
      This article discussed the five major trends and developments in cloud computing. The first point explains how there was a big trend towards cloud-only computing and away from on-premise infrastructure. We are realizing this isn't always the the best scenario and that a hybrid model allows for an enterprise to operate data-intensive processes while taking advantage of tech advancements associated with cloud computing. The second trend is utilizing "managed security service providers (MSSPs). This is because security is important to control both internally and externally. It also mentions "Zero-Trust Network Access" as a new executive order issued by President Biden. The third section discusses Kubernetes (Further research explained this is an open-source system for automating deployment, scaling, and management of containerized applications.) Kubernetes is also known as "K8s." This is a large shift from physical on-site infrastructure to "containers." This is packaging software for the deployment and the sharing of technology. The reason this is a trend is because it is cost-effective and improves performance. The final major trend is sustainability efforts. Cloud technology is more energy-efficient than on-site infrastructure, but advancements in (IoT) is causing significant growth and use of cloud tech which requires increased energy consumption. Cloud vendors are changing to ensure they are using renewable energy, carbon offsets, and data center efficiency. The most interesting part of this to me is the Kubernetes and Containerization as I have yet to read or hear anything about this. Open source is always interesting. The story behind K8's being developed by Google and now an independent foundation is good for our society and a good trend.
8More

GDS System: What is And Why Should Hotels Use a GDS System? - 1 views

  • For hotels, the number one advantage of using a GDS is the increased demand that can be generated. This is because a global distribution systems represents a single entry point for a huge number of travel agents globally.
  • a hotel will need to pay a small initial setup fee, along with transaction fees, which are applicable to each booking on an individual basis. In some cases, an agency fee may also apply.
  • The precise fees involved can vary significantly, depending on the travel agency, GDS and type of booking, but fees of around 10 percent are not uncommon.
  • ...2 more annotations...
  • A GDS sytem stands for “global distribution system” and is a network, which facilitates transactions between companies in the travel industry. These networks are then used by travel agencies, who are provided with real-time inventory and pricing information for hotel rooms, as well as airline tickets, car rental services and other products.
  • While hotel owners may prefer direct bookings, the reality is that global distribution systems continue to serve as a vital distribution channel. Through the use of a GDS system, a hotel has the capacity to reach travel agents and a much wider customer base, resulting in increased demand, more bookings and greater revenue
  •  
    A GDS system is a massive advantage for a hotel because it will increase demand which directly increases revenue. A GDS system can be even more beneficial if the hotel is targeting corporate travelers. However, a GDS system is not without its drawbacks. While there are options, it is not uncommon for a hotel to pay an initial fee and agency fee.
  •  
    This article gives a solid big picture overview of what GDS is and why is there a need to use a GDS. Also, it tells who are the three major players and what are the associated costs of using a GDS.
  •  
    This article signifies the use and importance of Global Distribution System (GDS) in hotels. GDS is a network that travel agencies are provided with information to help hotels book more. Hotels that target corporate travelers have an advantage using the GDS system. Businesses still turn to travel agents rather than booking directly. The GDS system will give a wide range customer base, more booking and more.
32More

Data Security in Hospitality: Risks and Best Practices - 0 views

  • Best practices for companies in the hospitality sector to protect data include:
  • Always encrypt payment card information. Operate a continuous training program in cybersecurity to maintain a well-trained workforce. Always adhere to relevant regulations, such as PCI DSS. Use cybersecurity measures such as firewalls, network monitoring, anti-malware, and traffic filtering to protect against common threats. Conduct tests against your organization’s cybersecurity defenses in which you mirror the behavior of an actual hacker. Know where your data is and enforce the principle of least privileges to limit access to sensitive information.
  • groups may use different computer systems to store information, and the information can also frequently move across those systems.
  • ...23 more annotations...
  • five of the biggest data security concerns in the hospitality industry and highlights some best practices for protecting hospitality data.
  • Data Security Concerns in Hospitality
  • complex ownership structures
  • From the perspective of cybercriminals, hospitality appears to offer an ideal target vector for conducting crimes such as identity theft and credit card fraud due to the existence of multiple databases and devices containing both Payment Card Information (PCI) and Personally Identifiable Information (PII).
  • challenge to maintain teams of well-trained staff.
  • t was reported in 2017 that out of 21 of the most high-profile hotel company data breaches that have occurred since 2010, 20 of them were a result of malware affecting POS systems.
  • can go unnoticed for months.
  • High Staff Turnover
  • In the U.K., for example, the job turnover rate in hospitality is as high as 90 percent.
  • Reliance on Paying By Card
  • t involves employees selling data to third parties without the knowledge of the organization that employs them.
  • Insider Threats
  • Compliance
  • Hotels, motels, resorts, and rented apartment complexes all gather and electronically store a range of sensitive personal guest data, such as names, phone numbers, addresses, and credit card details.
  • The high level of turnover and high degree of staff movement between different locations makes it a real challenge to maintain teams of well-trained staff
  • Each of these groups may use different computer systems to store information, and the information can also frequently move across those systems.
  • ospitality appears to offer an ideal target vector for conducting crimes such as identity theft and credit card fraud due to the existence of multiple databases and devices containing both Payment Card Information (PCI) and Personally Identifiable Information (PII).
  • ybercriminals use this reliance on cards to infect point-of-sale (POS) systems with malware that steals credit and debit card information by scraping the data
  • A case in point was the Wyndham Worldwide breaches of 2008 and 2010. Hackers gained access to the systems of an individual operating company through easily guessed passwords, and the attack easily proliferated through the entire corporate network, with the result that 619,000 customers had their information compromised.
  • While GDPR protects individual data within the EU and EEA, its ramifications have rippled through industries globally, and organizations are realizing the need to put greater compliance measures in place. PCI DSS is another important global regulation that protects credit card data, and fines for non-compliance begin at $500,000 per incident. The risk here is not just to data security but to the future survivability of hospitality companies, many of which would not be able to absorb the s
  • This type of data risk is more subtle and it involves employees selling data to third parties without the knowledge of the organization that employs them
  • Always encrypt payment ca
  • rd information. Operate a continuous training program in cybersecurity to maintain a well-trained workforce. Always adhere to relevant regulations, such as PCI DSS. Use cybersecurity measures such as firewalls, network monitoring, anti-malware, and traffic filtering to protect against common threats. Conduct tests against your organization’s cybersecurity defenses in which you mirror the behavior of an actual hacker. Know where your data is and enforce the principle of least privileges to limit access to sensitive information.
  •  
    This article highlights several important security issues in the hospitality industry, followed by the practice of protecting data from loss. The data structure of the hotel industry is complex, customers mainly use bank cards to pay, and the staff turnover rate is high. There are certain internal threats. In order to solve these problems and avoid data loss, it is not enough to strengthen network security. It is also important that employees are trained and familiar with and comply with relevant regulations.
  • ...3 more comments...
  •  
    Data security is a major issue in the hospitality industry. A lot of personal information is stored on the computers specifically credit card information of the guests staying at the hotel. It is the responsibility of the hotel to ensure that the data is protected. High turnover rate in the industry can make this an even bigger challenge. Ensuring that your staff is properly trained to ensure the highest level of security is maintained is highly important.
  •  
    This article speaks about the data security concerns in hospitality. Restaurants, hotels, and other companies in the hospitality sector often have complex ownership structures in which there's a franchisor and a management company that acts as the operator. Businesses use different computer systems to store information. The nature of the hospitality industry is such that it is extremely reliant on cards as a form of payment. Cybercriminals use this reliance on cards to infect point-of-sale (POS) systems with malware that steals credit and debit card information by scraping the data. A vital part of protecting data is training staff to securely gather and store personal information. Well-trained staff also know how to recognize social engineering attempts and they understand an organization's compliance requirements. Data security risks in the hospitality industry extend far beyond the reputation hit that a hotel can take if guests' data is compromised. Industry and political regulators are becoming stricter in governing how organizations process and store personal data. Some of the best practices for companies in the hospitality industry to use are: always encrypt payment card info, operate training programs in cybersecurity regularly to keep everyone informed, adhere to regulations, know where the data is, and enforce limit access to sensitive info, and more.
  •  
    This article explains how data security is at an all time high in the hospitality industry. Focuses on the 5 security concerns and what are some practices that leadership can help employees detect when someone is trying to hack into sensitive information. Also, making sure employees are in compliance with company policy when leaving the company if they have access to sensitive data and making sure employees are not using to their advantage when leaving the company.
  •  
    Hospitality offers an ideal target vector for conducting Cyber crimes such as identity theft and credit card fraud due to the existence of multiple databases and devices containing both Payment Card Information (PCI) and Personally Identifiable Information (PII). Restaurants, hotels, and other companies in the hospitality sector often have complex ownership structures with an individual owner or group of owners, and a management company that acts as the operator. Each of these groups may use different computer systems to store information, and the information can also frequently move across those systems.
  •  
    In this article, we learn about the top five data security risks as well as best practices to help prevent data breaches. According to the article, the hospitality industry is a prime target since it stores a vast amount of sensitive guest information like names, phone numbers, addresses, and credit card numbers. Some of the five risks included complex ownership structures, reliance on paying by card, and insider threats to name a few. In order to avoid these threats, the article suggest that companies become PCI compliant, use cybersecurity measures like firewalls, and know where exactly their data is stored.
24More

Hotel Technology Challenges for Every Hospitality Business - 2 views

  • Interoperability Data Management Security & Privacy Responsiveness
  • ue to the lack of standardization and specialized hospitality technology solutions, most hotels tend to develop their own proprietary solutions to manage assets.
  • Non-standardized technology can induce added learning times & on-boarding periods for guests.
  • ...17 more annotations...
  • This issue readily highlights the significance of applied technology management.    
  • Knowing and understanding customers is essential in predicting their behavior, future visits, and demands.
  • As the amount of data grows within hotel databases, the responsibility of back office management is quadrupled.
  • Authorization for data access, network & database security, and centralized database management are major concerns for hotels in the coming age. 
  • everal news outlets and hospitality professionals have already identified that hospitality companies are one of the most susceptible to data breaches. 
  • Hotel technology infrastructures must ensure that all digital interactions with guests are reinforced through robust security tech & privacy rules
  • Most hotels are handicapped by the knowledge and expertise they carry on the subject. A more reasonable idea is to consult with a technology management company that offers better insights, suggestions, and security framework designs for hotels. 
  • Advanced Hospitality has helped various hospitality ventures take root and develop their competency with technologies.
  • Hotels also need to enhance responsiveness for renovations and routine maintenance.
  • A responsive hotel tech infrastructure demands stronger resources, simpler network mapping, and seamless synchronization with hotel back office systems. 
  • Hospitality technology may be the most amazing transition to occur in the hospitality industry but remember it does come with a cost.
  • An efficient & effective hotel technology must be responsive and should acknowledge guest requests instantly.
  • thering gue
  • Gathering guest data is essential to the success of any modern business, hotels are no different.
  • Data management carries great emphasis in European countries, more so than their North American counterparts. While the current US government believes in a more lenient approach towards data retention and privacy,
    • amajo017
       
      Will be useful with regards to the lack of data privacy in US
  • With multiple point-of-sale (POS) touchpoints, an even larger number of smart devices, and that data from both demands a secure hotel network. Denying cybercriminals access to the network and preventing them from spying on guest devices is now essential for every business.
  • Highly optimized & synchronized systems leave almost no gaps when fulfilling guest requests. These technological marvels can even complete guest requests faster than hotel staff at times. This efficiency delivers a seamless guest experience while improving the responsiveness of technology. 
  •  
    This article discusses research that shows four hotel technology challenges in 2019. These challenged include Interoperability, Data Management, Security & Privacy, and Responsiveness. It argues that hotel management should be aware of these technologies because they can either help or hinder your business.
  •  
    This is an excellent article that explores that businesses in the hospitality face in their day to day running. The challenges that the article points out identifies include the interoperability of hotel technology systems, the management of data, the security and privacy of data, especially in the current era of cloud computing, and the responsiveness of hotel technologies. Although hotel technologies improve guest experience and foster efficiency in hospitality companies, such challenges may adversely their efficiency, and thus, adversely affect guest experience.
  •  
    This article discusses what we talked about this week in regards to the different types of technological disruptors in the hospitality industry. It discusses data management issues, privacy issues, and how responsiveness can be improved within hotels. This article will be useful for future research as I look more into artificial intelligence within the hotel industry.
4More

EventO: New Digital Management Tool for Corporate Events | BizBash - 0 views

  • TBA Global, an event marketing agency, has created EventO, a customizable platform to manage registration, promotion, networking, scheduling, social media, and follow-up for events of any size.
  • By consolidating everything in one site—which can be scaled for use on desktop systems, tablets, or mobile devices—the product is intended to be used by attendees before, during, and after an event.
  • We’ve made it flexible enough so it can work for any budget. We can do something like a simple informational site for as low as a couple hundred dollars," Busteed said. "The higher-end ones, where we manage all the content and video, can run as high as $250,000."
  •  
    The article introduces a new digital management tool for corporate events, which is called EventO. EventO is a platform that can help the venue managers, event planners and the customers, for it can help manage registration, promotion, networking, scheduling, social media and feedbacks. Furthermore, it can be used in different platforms, such as desktop, smartphones and tablets. It is convenient that people can get in touch with each other and know the meeting before it is actually held. During the event, EventO can also help register the guests and convey speakers' notes and presentations. After the event, people can get feedbacks and follow up with EventO. Regarding the cost, it can be varied based on its complexity.
5More

Get Social, or Get Left Out | Column | Hospitality Magazine (HT) - 1 views

  • Given the vastness of their connections and networks, this can quickly multiple into thousands or more potential customers with word-of-mouth insight into your products and service.
  • however, many successful examples of hotels using social networking sites to generate awareness and additional revenue opportunities.
  • While the size of the fan-base is important, the true value is in the interaction.
  • ...1 more annotation...
  • Though social networking tools are powerful, they must be well planned and carefully implemented to avoid pitfalls.
  •  
    This article discusses about the importance and benefit of adopting social media to your business. At the beginning of this article, the author trying to help us understanding the growing trend of social media by throwing some shocking numbers. Then he brings out the idea that more and more businesses included social media in their marketing tools. The he reminds us while the size of fans is important, that the interaction with customers is the true value of social media. At the last part of this article, the author gave out some suggestion on make the best use of social media. He mentioned that besides using social media as a channel to connect with customers, companies can also discover new employers via this medium, and get to know your customers' inside thoughts by responding to them. At last, the author reminds us the importance of social media once again.
6More

Conference News - Presentation Solutions - Cvent Makes Over 100 Improvements to Its Mee... - 0 views

  • According to the company, the new enhancements are expected to improve the user experience for both event planners and venues by offering "more robust, easier to use technology."
  • Planners and suppliers now have mobile access to the Cvent Supplier Network,
  • planners can now review and manage RFPs from their mobile devices while suppliers can view and act on group business leads, "leading to faster response times and improved client satisfaction."
  • ...2 more annotations...
  • Hotels can now integrate Cvent's web surveys with TripAdvisor, allowing post-stay survey data collected through Cvent's platform to be published automatically to TripAdvisor.
  • "Technology needs to evolve at a very fast pace to keep up with the demands of the market and we are committed to continuous innovation and providing best-in-class solutions to our users."
  •  
    Cvent, a meetings technology company, has gathered feedback from meeting planners and venues and responded by adding 100 enhancements to their online product. The company is looking to better the users experience and provide easy to use technology. The company's web survey, event management, strategic meetings management, and supplier network have all been improved with new technology. I think this type of business between suppliers and buyers in the meetings/events industry will be the main form of communication in the future. 
5More

The Disadvantages of a Point of Sale System | eHow.com - 0 views

  • It is a computerized system that links the cashier and customer to an entire network of information, handling transactions between the customer and store and maintaining updates on pricing and promotions. Although a point of sale system has many advantages
  • Cost of Web Access
  • Updates
  • ...1 more annotation...
  • Security Risks
  •  
    This article is about the disadvantages of the point of sales system, which is including the cost of web access, system updates, and the security risks. Firstly, the POS that allows the user to connect a single register to a larger network of information that would otherwise be unavailable or inconvenient to access, thus, some companies decide to go with a web-based system rather than a software-based system, which direct bring additional cost. What is more, if the companies decided to undertake the software-based point of sale system, they need to continue updating the system with new versions from the manufacturer or software company, which means addition cost/fee. Moreover, customers who use the debit cards with POS system, that will face the security risks problem, If the companies use the web-based system, the customer will under the security and privacy risks that come with doing business on the Internet.
10More

Advantage & Disadvantages of E-marketing - Marketing - 0 views

shared by xwang023 on 27 Mar 13 - No Cached
  • nternet marketing
  • In e-marketing, automated tools and/or software does the whole thing.
  • Therefore, it is very important that you are aware of the reward and inconveniences of internet marketing before you really strategize to optimize your revenue on the advantages and nullify the disadvantageous effects of virtual e-marketing.
  • ...5 more annotations...
  • Internet marketing
  • An e marketing effort supports the customer base almost round the clock.
  • In e-marketing, the cost of establishing your presence and networking with identical bloggers is nothing compared to offline business.
  • disadvantages of Internet marketing
  • Hardware safety and quality assurance, software that facilitates the unique business requirements, setting up or tagging with online payment channels, online distribution costs, maintenance of site and upgrading are all the requirements for a successful sustaining business on the net.
  •  
    Actually, an offline business could be very resource consuming in terms of cost of advertising and promotion through postal mails and networking similar business partners through tele-calling and organizing physical interactive sessions. In e-marketing, the cost of establishing your presence and networking with identical bloggers is nothing compared to offline business. The E-business through the internet obviously has huge benefit for the business nowadays.
  •  
    Most of the marketing efforts that cater to the organized sector are open 24 hours and 7 days a week. Moreover, the reach is global and customers feel convenient to shop/communicate anytime they want to. The clients are updated immediately about any new modifications and alternations in information through RSS feeds.

How to get the most out of the Global Distribution System (GDS) - 0 views

started by Marisa Chauvet on 07 Jun 13 no follow-up yet
14More

Infor Gives Hospitality Companies Edge In Measure Social Sentiment :: Hotel News Resource - 0 views

  • Infor, a leading provider of business application software serving more than 70,000 customers, today announced the availability of social sentiment measurement capabilities within the Infor Hospitality Management System dashboard.
  • Built through a new strategic collaboration with TrustYou, a market leader in online reputation management for the hospitality industry, hoteliers now have the tools to integrate TrustYou's data into Infor's existing Hospitality suite
  • providing real-time access to social sentiment that will aid staff in improving guest satisfaction to encourage more bookings.
  • ...9 more annotations...
  • and streamline them into a straightforward, digestible summary for properties to address as they see fit.
  • Through this added data, strengths and weaknesses can be identified in real-time so that hoteliers have the ability to rectify guest concerns more rapidly.
  • Specifically, these three new widgets -- Seal (TrustScore), Source and Review
  • via a series of dashboard-embedded widgets
  • The Seal Widget displays a hotel's overall TrustScore
  • The Sources Widget gives staff an overview of numerous review websites where the hotel is represented so properties can better manage their online reputation
  • the Review Widget displays current reviews of a hotel.
  • will enable hoteliers to listen, understand and respond to guests, and proactively fix any complaints or criticisms," said Ben Jost, CEO and co-founder of TrustYou.
  • which we believe will ultimately improve customer satisfaction, increase sales, drive marketing efforts and enhance customer service."
  •  
    This article describes a new tool to measure and aid in guest satisfaction. Through a strategic partnership, Infor (a business application software company) enlists TrustYou (a market leader in online reputation management) to help create a system used to provide real-time access to positive and negative feedback from guest. There are three widgets designed to search through data and streamline them into summaries that hotels can use to enhance their customers experience. All information reported is current information, that way hotels can quickly respond to their guests. This technology is key in creating the best guest experience possible and it allows hotels to do so within a matter of minutes. The real time access feature would allow hotels an opportunity to turn a would be negative experience into a positive one. Hotels rely on "word of mouth" Marketing, especially with social networks, blogs and message boards becoming such a huge part of the daily exchange of information. We must admit, a lot of us value the opinions of our Twitter followers. It is vital for hotels to keep up with these different areas of communication so they can strategically position themselves in an ever growing and competitive market. They can address concerns immediately while at the same creating opportunities to build their brand. Hotels must utilize this advanced approach if they want to survive in this industry.
  •  
    This article describes the infor company(a leading provider of business application software) and trust you(a market leader in online reputation management) built online reputation management software for hospitality industry. Hoteliers could access to the social senciment on a real time. From the customer's perspective, there are many factors related to choose a hotel form more than hundreds choices. Not only the hotel's facilities and services, but also the reputation on the internet will influnce customer's slection. Nowadays, with the rapid development of social networks, the senciment plays a great role in people's life. For example, in China, there is a web-site, named as "Quna". On that web-site, people share the travel information, rate the restaurants and hotes. The new travelers could get some ideas about the hotel choosing. Therefore, the hotel manager must pay attention to the public reputation management in time. Now, the hoteliers could access to the social senciment in real-time via a series of dashboard, embedded widgets. What's more, by this tool, the hotel employees could correction error, redeem hotel's reputation, improve customer satisfaction, and improve hotel's occupancy rate.
1More

Illasi Valleys created to promote hospitality in Verona - 0 views

  •  
    Illasi Valleys, which is composed of 52 companies, has been created in Verona, Italy. Even though the area in the Province of Verona is not that well-known, many popular brands of wine and olive oil are exported from there. The purpose of this network is to "promote local hospitality, increase visitors to the area, and to share the benefits between all members". Illasi Valleys is a network made up of companies from the wine and olive oil, hospitality, and manufacturing sectors of Verona. Illasi Valleys is expecting an ambitious budget of 1,200,000 euros. Part of this budget will fund the activation of an E-Commerce website. Important partnerships and collaborations are forming to implement this project. According to the article, "a network of international brand ambassadors located in various countries has also been created and a contract with US tour operator TourCrafters has been signed". The focus of Illasi Valleys is to increase the numbers of Northern European and US visitors.
12More

The Impact and Benefit of Information Communication Technology in The Developement of T... - 1 views

  • Most equipment used in the hospitality industry as in the case of computers or micro-processors, has computing technology at his heart and wide spread availability of the internet via high speed connection, has revolutionized how we communicate with each other and to this effect the latest development in mobile and wireless technology, we have the basis for whole new ways in how we operate both business and leisure purposes.
  • According to Cousins and Foskett. D; specific data about the business financial operation and forecasting of the business, production of routine text and graphic based materials such as menu’s, nutritional analogy and rota’s through an easily set up and operated solutions.
  • to the development of the hospitality industry which before now was depending on manual based operation. T
  • ...8 more annotations...
  • ELECTRONIC POINT OF SALE SYSTEM {EPOS}
  • RESERVATION SYSTEM {CRS}
  • FOOD AND BEVERAGE MANAGEMENT SYSTEM
  • MENU ENGENEERING
  • DIETRY ANALYSIS
  • EVENT MANAGEMENT SYSTEM
  • which is a global network of networks. This world wide network of computers allows any one connected to have virtually limitless data base of information and almost instantaneously communicate with anyone connected.
  • is the use of the web services to extract information in addition to text and graphics, many sites offer video, images and sound files and with this, the demands of customers are easily met.
  •  
    From the fore going, the computers are valuable in the management of a business when applied with information communication technology. Correctly and controlled systems are indispensable to a well-run business that wishes to maximize effectiveness and keep one step ahead of the competitions.  Therefore the impact of information and communication technology to the hospitality establishment can not be over emphasized if effectively applied will out perform others in the face of competitions.
3More

New App Creates a Network of Brands and Concierge Expertise on iPads | Products | Hospi... - 0 views

  • More than 100,000 users have experienced the app to select wine and food pairings. In the initial project, a Personal Sommelier was delivered on an iPad that can help consumers expertly explore wine and food pairings even before they dine at a restaurant. The results were positive for large brands and independent operators alike.
  • Promotion through the Apple App Store – more than 2 billion apps are downloaded every month, making a mobile app strategy more important than an Internet advertising strategy. Uptown gives mid and high tier brands superior access to this exploding distribution channel.   Cloud based back-end which enables world-wide seamless updates of new brands and content.
  •  
    Mobile users are not just playing Angry Birds or checking the local weather, 38% have used their mobile devices to plan a trip and 60% of respondents said they have downloaded travel apps on their mobile devices, according to a TripAdvisor survey. While travelling, 62% of travelers said they use their mobile devices to research restaurants. 51% check their flight status and 46% research attraction, 28% have checked in to a restaurant, hotel or attraction using their mobile device while on a trip, according to TripAdvisor. (travelmole, May 2011). A research conducted by PhoCusWright shows that 75% of frequent business travelers (those making at least five trips a year) are smartphone owners. About half of frequent leisure travelers have smartphones. There's more than enough evidence for the hospitality industry to use mobile apps, and some hotels have already started and are successfully doing it.
10More

QikServe: Mobile EPoS app using customer's smartphone - 0 views

  • The product
  • In turn there are no hardware or software requirements for hospitality operators who pay for a one-off set up fee and a small charge per order made using the app.
  • Diners are then able to scroll through the correct menu for the relevant time of day, place a food and drink order with any special requirements added and pay the bill if using a card.
  • ...6 more annotations...
  • but the more we looked into it we realised the benefits are even greater for waited service - you can reduce the number of waiter visits to the table and it takes away the routine transaction handling and lets them concentrate on the actual customer service
  • he product was perfect for fast-casual restaurant operators.
  • dubbed 'the waiter in your pocket', asks diners to scan a QR code on the table they are seated at to bring up the restaurant menu
  • the product can cut staff costs, reduce cash handling, capture consumer behaviour by tracking visits and orders and can also send targeted offers to restaurant
  • customers.
  • QikServe is also enabled for links to social networking sites including Facebook and Twitter in order to allow diners to leave instant feedback or online reviews of the restaurant experience.
  •  
    It will be an interesting experience that you can place a drink or food order with your special requirements and to pay the bill if using a card by your own iphone, iPad, or Android smart phone? The product, dubbed 'the waiter in your pocket, made this become true. The app uses a cloud-based system, hosted by QikServe, to receive orders, connecting with the restaurant's own EPOS system, so the front and back of the house can view the order as soon as possible. It is time efficient and cost saving. Since it is cloud-based, there are no hardware or software requirements for the operators. Besides the staff costs can be reduced to a large degree because a lot of work can be done by the system. We can also expect improvements in service quality for most of the causal restaurants or chain restaurants. Staff spend more time taking care of  each table with less time spent on ordering and cash handling. The system can help to capture consumer behavior and send target offers to them. QikServe is linked to social networking sites, so we can view feedbacks posted by customers directly. It is a good choice for casual restaurants and chain restaurants to apply this system.
2More

10 Reasons Social Media Matters for Today's Event Planner - 0 views

  •  
    The business of Event Planning is booming and continues to grow largely in part due to social media. This article explains 10 reasons why they complement each other so well and it all revolves around the social aspect of our daily lives. Social networks bring people together and with today's technology, event planners can target specific groups or individuals quickly and efficiently at relatively little cost. I believe that social media is the driving force behind Event Planning. Without social media like Facebook and LinkedIn, Event Planning would be very costly and time consuming since these social media networks connect you to millions of people with the click of a button. I believe that without them, the task of reaching out to people and the cost of postage would hardly be worth the time.
  •  
    Social Media can impact not just a specific group but also many different groups. The need for meeting planner to utilize Social Media will benefit both the client/planner. We are so connected with our social media i.e. Facebook, twitter, Skype that neglect to read regular mail and even emails at times. Our phone technology has helped us stay focus on our social media networks (http://mashable.com/2009/04/29/events-social-media/).
18More

Restaurants, Beware: Hackers Want Your Customer Data - 1 views

  • The simple fact is that cyber criminals today want information that they can use to make money
  • We found that nearly 90 percent of attacks were designed to steal customer information including cardholder data, e-mail addresses and account information.
  • many restaurants and franchise businesses, unsecure and public WiFi networks are conveniently (for the criminal) connected to point of sale systems.
  • ...14 more annotations...
  • but the number one is that they all process credit cards.
  • assets targeted by criminals were point-of-sale software systems
  • Think of the scenario of a hotel that maintains a restaurant, a spa, as well as other services all connected to one POS system
  • The risk is even greater when hotels are part of a hotel chain with interconnected systems.
  • Franchise businesses are particularly at risk primarily because franchises tend to have the same POS system duplicated at all locations
  • Most of the time these business don’t have trained security professionals on staff; instead most assume their IT personnel are taking care of all of their security needs.
  • 76 percent of environments we investigated had a third party introduce a security flaw within the environment that contributed to criminals being able to compromise data.
  • Another alarming trend we found in our investigations was that self-detection of breaches decreased in 2011, and only 16 percent of victimized organizations actually detected the breach themselves.
  • The best intrusion detection systems are neither security experts nor expensive technology, but employees.
  • Very often businesses ignore that fact that while their employees might not be security experts,
  • the POS screen looked differently than it had the day before.
  • The cashier reported it to the company’s security hotline and sure enough there was a cybercriminal on the system.
  • When working with third parties, always build in security requirements into the contract and impose policies and procedures such as good password policies to ensure tight control and better security.
  • The quicker an organization can identify an issue and respond to a breach, the less likely they will experience the deep penalties, both financial and to their brand.
  •  
    The article I read was called, "Restaurants, Beware: Hackers Want Your Customer Data." In the article it talked about how cyber criminals want credit card information from people so that they can make money off of them. Criminals find new ways everyday to breach systems and steal information from guests staying at hotels or eating in restaurants. It states that many restaurants and franchise businesses use unsecure and public WiFi networks are connected to the point of sale system. "Franchise businesses are particularly at risk primarily because franchises tend to have the same POS system duplicated at all locations." A lot of times businesses don't have trained security on staff, they just assume that their IT person will be talking care of the security. According to the article the best detection systems are neither the technology nor the security but it's the employees who work there. The employees can tell when something has changed in the system and as soon as they realize that, they need to report it to their manager. I never even considered people breaking into the systems and stealing credit card information but it does happen and it's important to know what to do in these kinds of situations.
« First ‹ Previous 181 - 200 of 796 Next › Last »
Showing 20 items per page