","showSummary":null,"url":"/4-ways-make-data-differentiator","date":"2017-05-11T00:00:00","author":{"email":"devteam@ashday.com","uname":"ht_root","firstName":null,"lastName":null,"bio":null,"title":null,"picture":null,"phone":null,"contactForm":null},"digitalEdition":null,"sponsored":false,"taggedPro":null,"teaserImage":{"id":21439,"url":"https://assets1.hospitalitytech.com/styles/secondary_articles_short/s3/intelbiz0517.jpg?itok=ClAjAkpL","width":196,"height":219,"alt":""},"topics":[{"name":"Data & Analytics","url":"/data-analytics"},{"name":"May 2017 Issue","url":"/may-2017-issue"},{"name":"Security -- Network","url":"/security-network"},{"name":"Back-of-House / Back-Office","url":"/back-house-back-office"},{"name":"Forecasting","url":"/forecasting"},{"name":"Inventory Control/Management","url":"/inventory-controlmanagement"},{"name":"Kitchen Operations & Management","url":"/kitchen-operations-management"},{"name":"Labor/Workforce Mgmt/Scheduling","url":"/laborworkforce-mgmtscheduling"},{"name":"Menu & Nutritional Analysis","url":"/menu-nutritional-analysis"},{"name":"Mobile Devices & Apps","url":"/mobile-devices-apps"},{"name":"POS","url":"/pos"},{"name":"Revenue Management","url":"/revenue-management"},{"name":"Operations","url":"/operations"},{"name":"Software","url":"/software"},{"name":"Restaurants","url":"/restaurants"},{"name":"Lodging","url":"/lodging"},{"name":"Intelligent Biz","url":"/intelligent-biz"},{"name":"Mobile Device Security","url":"/mobile-device-security"},{"name":"Hotels","url":"/hotels"}],"attachedFiles":[]},{"title":"Check-In Announces Official Status as ASSA ABLOY Hospitality Certified Partner","id":9241,"bundle":"article","summary":"Isreal-based mobile application company is now fully compatible with ASSA ABLOY Hospitality's VingCard locks.","showSummary":null,"url":"/check-announces-official-status-assa-abloy-hospitality-certified-partner","date":"2017-05-10T00:00:00","author":{"email":"devteam@ashday.com","uname":"ht_root","firstName":null,"lastName":null,"bio":null,"title":null,"picture":null,"phone":null,"contactForm":null},"digitalEdition":null,"sponsored":false,"taggedPro":null,"teaserImage":null,"topics":[{"name":"Check-in/out (hotel)","url":"/check-inout-hotel"},{"name":"Locking","url":"/locking"},{"name":"Mobile Devices & Apps","url":"/mobile-devices-apps"},{"name":"Online Check-In","url":"/online-check"},{"name":"Security -- Physical","url":"/security-physical"},{"name":"Self-Checkout","url":"/self-checkout"},{"name":"Lodging","url":"/lodging"},{"name":"Hotels","url":"/hotels"}],"attachedFiles":[]},{"title":"Cybercriminals Increasingly Target Hotel Contact Centers","id":9247,"bundle":"article","summary":"But new technologies can ensure that payment card data and other personally identifiable information taken over the phone is kept secure and never held in the contact center infrastructure.","showSummary":null,"url":"/cybercriminals-increasingly-target-hotel-contact-centers","date":"2017-05-09T00:00:00","author":{"email":"devteam@ashday.com","uname":"ht_root","firstName":null,"lastName":null,"bio":null,"title":null,"picture":null,"phone":null,"contactForm":null},"digitalEdition":null,"sponsored":false,"taggedPro":null,"teaserImage":{"id":21432,"url":"https://assets1.hospitalitytech.com/styles/secondary_articles_short/s3/call-center_0.jpg?itok=HyLOfpjK","width":190,"height":210,"alt":null},"topics":[{"name":"Call Center","url":"/call-center"},{"name":"Security -- Network","url":"/security-network"},{"name":"Loss Prevention/Fraud Detection","url":"/loss-preventionfraud-detection"},{"name":"Mobile Device Security","url":"/mobile-device-security"},{"name":"Payment Security","url":"/payment-security"},{"name":"Lodging","url":"/lodging"},{"name":"Hotels","url":"/hotels"}],"attachedFiles":[]},{"title":"CC’s Coffee House Selects PAR Technology’s Cloud-Based Brink POS Software","id":9261,"bundle":"article","summary":"New technology offers ease of use, added features, stability and a more modern and sleek POS system.","showSummary":null,"url":"/ccs-coffee-house-selects-par-technologys-cloud-based-brink-pos-software","date":"2017-05-05T00:00:00","author":{"email":"devteam@ashday.com","uname":"ht_root","firstName":null,"lastName":null,"bio":null,"title":null,"picture":null,"phone":null,"contactForm":null},"digitalEdition":null,"sponsored":false,"taggedPro":null,"teaserImage":null,"topics":[{"name":"Mobile Point of Sale (POS)","url":"/mobile-point-sale-pos"},{"name":"POS","url":"/pos"},{"name":"Payment Security","url":"/payment-security"},{"name":"Restaurants","url":"/restaurants"},{"name":"Coffee Bar","url":"/coffee-bar"}],"attachedFiles":[]},{"title":" Does Your Hotel Have Cyber Liability Coverage?","id":9258,"bundle":"article","summary":"Most general liability policies do not cover cybercrimes or costs associated with a privacy event or breach, and some even specifically exclude losses incurred because of the internet or computer systems.","showSummary":null,"url":"/does-your-hotel-have-cyber-liability-coverage","date":"2017-05-05T00:00:00","author":{"email":"devteam@ashday.com","uname":"ht_root","firstName":null,"lastName":null,"bio":null,"title":null,"picture":null,"phone":null,"contactForm":null},"digitalEdition":null,"sponsored":false,"taggedPro":null,"teaserImage":{"id":21427,"url":"https://assets1.hospitalitytech.com/styles/secondary_articles_short/s3/cyber-crime-190x210.jpg?itok=Q6NIoSHI","width":190,"height":210,"alt":null},"topics":[{"name":"Security -- Network","url":"/security-network"},{"name":"Mobile Device Security","url":"/mobile-device-security"},{"name":"Payment Security","url":"/payment-security"},{"name":"Lodging","url":"/lodging"},{"name":"Hotels","url":"/hotels"}],"attachedFiles":[]}]},"title":"Security","contentParagraphs":null,"sections":null};
const country = "US";
const language = null;
const SITE_LANGUAGE = "en";
const siteName = "Hospitality Technology";
const userRoles = ["anonymous"];
const userUid = 0;
const indexName = "HT";
const title = "Security | Hospitality Technology";
window.dataLayer = window.dataLayer || [];
const data = {};
data.entityTaxonomy = {};
const contentTypes = [
"article",
"blog",
"bulletin",
"embed_page",
"landing_page",
"event",
"image",
"page",
"product",
"whitepaper",
"video",
"tags",
];
if (
routeInfo &&
"bundle" in routeInfo &&
contentTypes.includes(routeInfo["bundle"])
) {
data.entityBundle = routeInfo.bundle;
data.entityTitle = title || `${routeInfo.title} | ${siteName}`;
data.entityId = routeInfo.id;
data.entityName = routeInfo.author?.uname;
data.entityCreated = routeInfo.created;
data.sponsored = routeInfo.sponsored;
data.sponsor = routeInfo.sponsoringCompany;
data.entityType = "node";
data.entityLangcode = SITE_LANGUAGE;
data.siteName = siteName;
data.drupalLanguage = language;
data.drupalCountry = country;
data.userRoles = userRoles;
data.userUid = userUid;
data.entityTaxonomyKeys = {};
data.entityTaxonomyHierarchies = {};
data.parentNaicsCode = {};
data.isPro = false;
data.algoliaIndexName = indexName;
// Add toxonomy data
const taxonomies = {
businessTopic: "business_topic",
contentType: "content_type",
company: "company",
marketSegment: "market_segment",
};
const getHierarchy = (term, terms = []) => {
terms.push({ id: term.id, name: term.name });
if (term.parentTerm != null) {
getHierarchy(term.parentTerm, terms);
}
return terms;
};
const getTerms = (term, useApiId = false) => {
return { id: useApiId ? term.apiId : term.id, name: term.name };
};
const getKeys = (term) => {
return { id: term.id, name: term.apiId };
};
Object.entries(taxonomies).forEach(([key, item]) => {
terms = routeInfo[key];
if (terms && terms.length > 0) {
data["entityTaxonomy"][item] = terms.map((term) =>
getTerms(term, key === "company")
);
if (key !== "company") {
data["entityTaxonomyKeys"][item] = terms.map(getKeys);
termGroups = [];
terms.forEach((term, termInd) => {
termGroups[termInd] = getHierarchy(term);
});
data["entityTaxonomyHierarchies"][item] = termGroups;
}
}
});
data["entityTaxonomy"]["tags"] = routeInfo["topics"] || [];
// Primary Topic is either the business topic or the top tag.
if (routeInfo["businessTopic"]?.length > 0) {
data["entityPrimaryTopic"] = routeInfo["businessTopic"][0]["name"];
} else {
if (routeInfo["topics"]?.length > 0) {
data["entityPrimaryTopic"] = routeInfo["topics"][0]["name"];
}
}
// Primary and secondary entityNaicsCodes come from the MarketSegment
if (routeInfo.marketSegment?.length > 0) {
data.entityNaicsCode = {};
data["entityNaicsCode"]["id"] = routeInfo["marketSegment"][0]["id"];
data["entityNaicsCode"]["name"] =
routeInfo["marketSegment"][0]["naicsCode"];
if (routeInfo["marketSegment"][0]["parentTerm"] != null) {
data["parentNaicsCode"]["id"] =
routeInfo["marketSegment"][0]["parentTerm"]["id"];
data["parentNaicsCode"]["name"] =
routeInfo["marketSegment"][0]["parentTerm"]["naicsCode"];
}
} else {
data.entityNaicsCode = [];
}
if (routeInfo.taggedPro) {
data.isPro = routeInfo.taggedPro;
}
window.dataLayer.push(data);
} else if (routeInfo && "vid" in routeInfo) {
data.entityBundle = "tags";
data.entityTitle = routeInfo.name;
data.entityId = routeInfo.id;
data.entityName = routeInfo.author?.uname;
data.entityCreated = routeInfo.created;
data.entityType = "taxonomy_term";
data.entityLangcode = SITE_LANGUAGE;
data.siteName = siteName;
data.sponsored = routeInfo.sponsored;
data.sponsor = routeInfo.sponsoringCompany;
data.drupalLanguage = language;
data.drupalCountry = country;
data.userRoles = userRoles;
data.userUid = userUid;
data.algoliaIndexName = indexName;
data["entityTaxonomy"]["tags"] = {
id: routeInfo["id"],
name: routeInfo["name"],
};
window.dataLayer.push(data);
}
})();
Security | Hospitality Technology
These new capabilities offer mid-market and enterprise customers greater visibility, management and communication across locations.
MURTEC interactive workshop uncovers challenges and best practices for determining brand appropriate technology strategies.
Does Your Hotel Have Cyber Liability Coverage? Most general liability policies do not cover cybercrimes or costs associated with a privacy event or breach, and some even specifically exclude losses incurred because of the internet or computer systems.
X
This ad will auto-close in 10 seconds