⚠ We would appreciate if you would disable your ad blocker when visiting our site! ⚠

LATEST issue

Supply Chain Attacks

Bad actors with malevolent intentions can wreak havoc on supply chain systems, costing organizations time, frustration and millions of dollars. John Bell details how these attacks originate, and details industry best practices to identify vulnerability and protect against malware attacks.

tech spotlight

Bringing Digital Entertainment into Focus for Hoteliers

As the digital entertainment journey continues to evolve within the hospitality space, hoteliers are faced with more complex decisions than ever before about exactly how to provide their guests with both a memorable and seamless experience.


LEARN MORE

Telecom Compliance in Hotels

A Certificate of Occupancy (CO) is a vital requirement before opening your new-build/renovated hotel. Without it, you’re subject to massive, compounding fines! Because of the necessity of this certification, you’ll want to work it into your construction plans from the very beginning to avoid any project delays.


LEARN MORE

SOFTWARE CORNER

Looking for Security?

  • Software Corner Logo 1
  • Software Corner Logo 2
  • Software Corner Logo 3
  • Software Corner Logo 4
  • Software Corner Logo 5
  • Software Corner Logo 6
  • Software Corner Logo 7
  • Software Corner Logo 8
  • Software Corner Logo 9
LEARN MORE
Mobile Access Keys Do you use mobile access for your hotel room when available? The poll is closed.
Yes, always.
 
42%
Yes, sometimes.
 
19%
No, I prefer an actual key card/key.
 
19%
No, I am afraid of this access.
 
9%
I would but I don’t see it very often.
 
9%

industry installs

Live This Week

READ MORE