Technology Trends 2001 On the Threshold of Real Efficiency- But will we get there?

Inge, Jon
July 2001
Hospitality Upgrade;Summer2001, p1
Trade Publication
The article discusses the technology trends in the hospitality industry in 2011. It states that the over-arching trend in the hospitality industry is toward the increasing availability of right information access, enabling a quantum jump in the efficiency of operations. It mentions the four linked components that give rise to the technology trends, including better integration of systems, improved hospitality-focused tools, and growing application of personal digital assistants (PDAs).


Related Articles

  • Editorial Notes. Agarwal, Ritu // Information Systems Research;Jun2011, Vol. 22 Issue 2, p213 

    An introduction is presented in which the editor discusses various reports within the issue on topics including the experimental study of online privacy information revelation and consumer transaction behavior, the specification of precise requirements for information technology (IT) artifact...

  • Get protected. MEEK, RHODA // Diva;Jan2016, p71 

    The article offers tips on how to get protected online and discusses the importance of online security as technology gets sophisticated and the methods people used to gain access to them.

  • Combining work and play threatens IT security. Antonopoulos, Andreas // Network World;10/15/2007, Vol. 24 Issue 40, p38 

    The article reflects on the inherent risk in using the same computing environment for work and home. In line with this, he believes that it is difficult to reconcile the security policies of one type of use with the of another. He argues that instead of separating different use contexts...

  • A Variant Approach in Access Control Mechanism for Medical Emergency Department using PBAC. Rafee, Md. Mahmudul Hasan; Islam, Md. Maidul; Oly-Uz-Zaman, Md. // International Journal of Computer Applications;May2012, Vol. 45, p15 

    Automated access control model is an emergency access control system that offers a security policy which allows automated secured access to resources without making the user aware of it. User relaxes from all security overheads while the system continues to provide security all the time. Thus it...

  • Opposing UCITA: Libraries Can't Do It Alone. Ashworth, Carol // American Libraries;Apr2001, Vol. 32 Issue 4, p18 

    Discusses the need for United States libraries to gain allies in their fight against the Uniform Computer Information Transactions Act (UCITA). The act's limitations on all types of transactions involving computer information; The support for the bill in the software and publishing industries;...

  • Infrastructuring: Toward an Integrated Perspective on the Design and Use of Information Technology. Pipek, Volkmar; Wulf, Volker // Journal of the Association for Information Systems;May2009, Vol. 10 Issue 5, p447 

    In this contribution, we investigate how results from the ongoing discussion about e-Infrastructures can be used to improve the design of IT infrastructures in organizations. We first establish a perspective on organizational IT as work infrastructure that focuses on the infrastructural nature...

  • A cibersexualidade e a pesquisa online: algumas reflexões sobre o conceito de barebacking. da Silva, Luís Augusto Vasconcelos // Interface - Comunicação, Saúde, Educação;jul-set2010, Vol. 14 Issue 34, p513 

    This paper results from online research on aspects of male sexuality and, more precisely, about male interactions within new contexts of the HIV/AIDS epidemic. It seeks to discuss the possibilities of the internet as a research field, considering the sociocultural issues that are opened up by...

  • Business Continuity Solutions to Survive Outages. Kumar R., Arun // Database Trends & Applications;Jun2007, Vol. 21 Issue 6, p20 

    The article discusses several business continuity solutions of Oracle that can provide essential or all functionalities needed to run businesses in case of any outages. Oracle Databases are used for geographically dispersed data center operations. Oracle uses several techniques, like Oracle Data...

  • A secure utility. Stoller, Jocob // CMA Management;Apr2004, Vol. 78 Issue 2, p47 

    This article focuses on the need of data security by means of "utility computing" in facing security challenges by companies using information technology (IT). The need to deliver sophisticate technology simply and efficiently has become a key imperative for the IT industry. Utility computing or...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics