Schubach, Michael
July 2004
Hospitality Upgrade;Summer2004, p50
Trade Publication
Reports on seamless integration of different systems as the top technology issue facing the hospitality industry. Complexity of service offerings of the industry which requires specialized solutions; Strategies that can be used to obtain the integration sought by the industry; Reasons for the possible under-utilization of the system.


Related Articles

  • An assessment of information systems taxonomies: time to be re-evaluate? Doke, E. Reed; Barrier, Tonya // Journal of Information Technology (Routledge, Ltd.);Jun94, Vol. 9 Issue 2, p149 

    Dramatic advances in technology, evolving organizational structures and increasing user influence are impacting the types of information systems (IS) being developed. These are not recognized adequately by existing taxonomies which tend to be incomplete, unclear, simplistic, unwieldy, inflexible...

  • Towards determining the appropriate systems development environment: the role of the task characteristics. Lakhanpal, Bharat // Journal of Information Technology (Routledge, Ltd.);Mar1992, Vol. 7 Issue 1, p37 

    The growth of user developed computer-based applications (UDA) presents today's organizations with a means to augment traditional systems development by Information Systems professionals. In order to effectively use the resources offered by these two development environments, organizations need...

  • Identity management solutions: sales to reach $6.2 billion in 2007.  // MarketWatch: Global Round-up;July 2004, Vol. 3 Issue 7, p180 

    Presents a graph depicting the global identity management product and services spending.

  • EV.OLUTION OF V.IRTU'ALIZATION. Chickowski, Ericka // eWeek;9/21/2009, Vol. 26 Issue 16, Special section p10 

    The article discusses the challenges encountered by virtualization technology and the strategies to manage this. It states that virtualization has several disadvantages including the lack of management visibility and high costs in storage management and planning. It cites two approaches to deal...

  • FORMAL APPRACH TO A WEB INFORMATION SYSTEM BASED ON STORY ALGEBRA. Molnár, Bálint; Benczúr, András; Tarcsi, Ádám // Singidunum Journal of Applied Sciences;Oct2012, Vol. 9 Issue 2, p63 

    Web Information Systems (WIS) are becoming more and more ubiquitous along with the changes in information technology. There have already been several studies on modeling various aspects of WIS. This paper attempts to investigate the most recent paradigms of WIS description taking into account...

  • Chapter 2: Avoiding information overload.  // Bloomsbury Business Library - Manage Your Time;2004, p12 

    Chapter 2 of the book "Bloomsbury Business Library--Balance Your Life & Work" is presented. It focuses on the ways to prevent information overload. The speed with which customers expect to complete transactions has increased. Technology now allows for the instantaneous transfer of information to...

  • THE USE OF INFORMATION SYSTEMS IN HOTEL MARKET OF CLUJ-NAPOCA. Rus, Rozalia Veronica // Studia Universitatis Babes-Bolyai, Negotia;2009, Vol. 3, p51 

    The main objective of this paper is to review of the information systems used by hotels in their activity. Also, we want to determine the information systems used in hotels from Cluj-Napoca, Romania and to present their main characteristics and capabilities.

  • The Importance of Technology, Systems, and Information Skills in the Hospitality Industry. Quinn, Katherine A. // Consortium Journal of Hospitality & Tourism;2012, Vol. 17 Issue 1, p66 

    The purpose of this study was to gain an understanding of industry practitioners? perceptions of the importance of critical technology, systems, and information management competencies in hospitality graduates. This research study used quantitative methods for data collection and analysis. The...

  • A Fresh Take on ISO 1799, BS7799. Mimoso, Michael S. // Information Security;Aug2005, Vol. 8 Issue 8, p18 

    Reports on the revision of the ISO 17799 and BS7799 standards for enterprise information security programs and systems, as of August 2005. Changes made to the standards; Description of the previous versions; Purpose of the revisions.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics