TITLE

ASP: The Future of Your PMS

AUTHOR(S)
Wilkins, Sam
PUB. DATE
October 2000
SOURCE
Hospitality Upgrade;Fall2000, p1
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article offers information on the utilization of application service providers (ASP) in portfolio management services (PMS). It states that the decrease cost of greater bandwidth opened an opportunity for Internet and development of web-based and web-enabled PMS application ASP software. It considers security as one of the major issues concerning ASP systems. It also features several companies that implement ASP including Northwind and Innsite Hotel Services Ltd.
ACCESSION #
62828164

 

Related Articles

  • Necessary integration: security and development. Mimoso, Michael S. // Information Security;Apr2007, Vol. 10 Issue 4, p23 

    The article focuses on application security which evaluates source code for vulnerabilities during web development. Steve Zimmerman, former chief information security officer for a financial institution, asserts that programmers are having a hard time with rolling out internal applications. He...

  • Back Offices Are Set For A Core Revolution. Fest, Glen // Bank Technology News;Apr2006, Vol. 19 Issue 4, p1 

    The article reports on efforts by asset management firms in the United States to improve their back offices using middleware and messaging technologies. Chief information officers and information technology managers have been examining their budgets and compliance issues and Global Investment...

  • MOBILE DEVICE SECURITY. IBM provides cyber threat analytics from the cloud.  // Health Management Technology;Sep2015, Vol. 36 Issue 9, p22 

    The article offers information about the service features of the QRadar security intelligence technology offered by IBM as a cloud-based Software as a Service (SaaS) for companies.

  • Protecting the intangible assets on the plant floor. Palus, Tad // Plant Engineering;Feb2009, Vol. 63 Issue 2, p43 

    The article provides information on intangible asset management. It states that application process is the most important investment that a manufacturer can have. However, it mentions that it is the most unprotected due to its intangibility. It states that intellectual property is critical to...

  • Mitigating Distributed Denial of Service Attacks in Multiparty Applications in the Presence of Clock Drifts. Fu, Zhang; Papatriantafilou, Marina; Tsigas, Philippas // IEEE Transactions on Dependable & Secure Computing;Jul2012, Vol. 9 Issue 3, p401 

    Network-based applications commonly open some known communication port(s), making themselves easy targets for (distributed) Denial of Service (DoS) attacks. Earlier solutions for this problem are based on port-hopping between pairs of processes which are synchronous or exchange acknowledgments....

  • Three Golden Rules for Software Security in the IoT. Lesokhin, Lev // Software World;Nov2015, Vol. 46 Issue 6, p4 

    The article offers suggestions for software security in the Internet of Things (IoT). Topics discussed include evolution in IoT landscape, failures of software in protecting from cyber-attacks and security breaches and systemic failure caused by miscommunication between an application, a sensor...

  • Is the Cloud Your Answer? FIGGINS, MIKE // Speech Technology Magazine;Jan/Feb2011, Vol. 16 Issue 1, p6 

    The article offers advice for businesses on using cloud service for their contact center applications. The overall benefits of a cloud service include flexible scalability, rapid time to deployment and costs and risk mitigation. The factors that should be considered before adapting cloud service...

  • Making the cloud work for healthcare. Webb, Geoff // Health Management Technology;Feb2012, Vol. 33 Issue 2, p8 

    The article discusses the opportunities by cloud computing to the healthcare industry. It refers to cloud computing as a whole range of information technology services delivered through the Internet. It cites the three types of services which include the software as a service (SaaS), platform as...

  • Your Data May Be Unsafe: In-dealership backup tapes are vulnerable in many ways. Fortier, Wayne A. // Ward's Dealer Business;Mar2007, Vol. 41 Issue 3, p34 

    The article offers tips on how to ensure the security of dealership back-up tapes in the event of a natural disaster. Application service provider (ASP) solution, in which the dealer-management system server is hosted offsite by a vendor, has ensured that the data are safe. In addition, the...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics