top trends in hospitality for 2019

| January 8, 2019

article image
Accounting for more than 10% of global GDP and the creation of one in five new jobs according to the World Travel and Tourism Council, travel and tourism continues to be one of the world’s fastest-growing industries. It is also an industry undergoing rapid transformation, shaped by new technologies and the values and needs of an increasingly diverse range of travellers.

Spotlight

Verizon Enterprise Solutions

In today’s rapidly transforming environment, we design, build, and operate the networks, information systems, and mobile technologies that help businesses and governments around the globe expand reach, increase productivity, improve agility, and maintain longevity.

OTHER ARTICLES

AI + IoT = Automating and Analyzing Data Collection

Article | February 18, 2020

IoT is huge, but AI has the potential to supercharge the technology even more. Gartner predicts that this year 80 percent of all enterprise IoT projects will include AI. One area where many have been critical of IoT is a lack of good security. When coupled with AI, that could be improved, but some worry that AI can also be used as a tool to defeat IoT security. Dean Chester, cybersecurity author, wrote that “AI can be used for IoT security, or it can be used against it.”Melvin Greer, Chief Data Scientist, Intel Americas , said that “AI and IoT are no longer in separate swim lanes. AI closes the loop in an IoT environment where IoT devices gather or create data, and AI helps automate important choices and actions based on that data. Today, most organizations using IoT are only at the first ‘visibility’ phase where they can start to see what’s going on through IoT assets. But they’re moving toward the reliability, efficiency and production phases, which are more sophisticated and require stronger AI capabilities.

Read More

5 Ways to Secure Your IoT Devices—Before They Get Hacked

Article | February 18, 2020

Internet of Things (IoT) devices make our lives more efficient and our day-to-day more convenient. They allow us to monitor our homes from afar, control our lights, thermostats, and locks and beef up the security of our homes—among a host of other things. But because smart devices have become so integrated into our lives, they leave us vulnerable to cybercrime too. In general, IoT devices have little to no built-in security, making them top targets for hackers. And since most IoT devices are interconnected, it puts your whole suite of devices at risk if even one gets hacked. Just as you lock your front door before you go to bed, you’ll want to make sure your IoT devices are secure before you start using them.

Read More

How Will IoT Revolutionize Pharmaceutical Manufacturing?

Article | February 18, 2020

Pharma is big business, but what it’s not generally recognized is, in large part, a manufacturing business with complex supply chains, finicky chemical processes and products that have to meet stringent quality controls. Few of those outside the industry think about how drugs are made safely, efficiently and at scale with reliable quality and in precisely measured doses. Even more interesting is the simple fact that pharma often produces sophisticated drugs using manufacturing processes that are decades out of date, and which are being phased out in comparable industries, such as chemical manufacturing.

Read More

How Will the Emergence of 5G Affect Federated Learning?

Article | February 18, 2020

As development teams race to build out AI tools, it is becoming increasingly common to train algorithms on edge devices. Federated learning, a subset of distributed machine learning, is a relatively new approach that allows companies to improve their AI tools without explicitly accessing raw user data. Conceived by Google in 2017, federated learning is a decentralized learning model through which algorithms are trained on edge devices. In regard to Google’s “on-device machine learning” approach, the search giant pushed their predictive text algorithm to Android devices, aggregated the data and sent a summary of the new knowledge back to a central server. To protect the integrity of the user data, this data was either delivered via homomorphic encryption or differential privacy, which is the practice of adding noise to the data in order to obfuscate the results.

Read More

Spotlight

Verizon Enterprise Solutions

In today’s rapidly transforming environment, we design, build, and operate the networks, information systems, and mobile technologies that help businesses and governments around the globe expand reach, increase productivity, improve agility, and maintain longevity.

Events