Likely, the first thing that comes to your mind when you encounter the word “robot,” is a metallic, humanoid automaton that has by some fluke of science or magic gained sentience. A creation of 20th-century fiction, robots have made the leap from imagination to the real world, from the farm to Mars …
Die Zeit ist reif für ein veganes Menü
Stellen Sie sich Folgendes vor: Eine Gruppe von 10 Personen streitet sich darüber, wo sie essen gehen soll, als jemand Ihr Restaurant vorschlägt. Man ist sich einig, dass das Essen und der Service in Ihrem Restaurant hervorragend sind, bis der eine Veganer in der Gruppe darauf hinweist, dass es auf Ihrer Speisekarte nichts gibt, was er wirklich essen kann. Nach einigem Gemurre lehnen sie ab ...
The Restaurant No Call No Show: A Piece of the Employee Handbook Puzzle
It’s a busy Saturday at your restaurant, and your entire crew is at their stations filling orders. As you stand near the hosts’ stand, readily available to resolve issues at a moment’s notice, you realize one of your servers was scheduled to arrive almost two hours ago. Checking your phone, you …
Restaurant Industry News Roundup: May 2019
As summer approaches, restaurant industry news is really heating up. We’re firing up a hearty helping of topics from environmental action taken by the UK government and the relevance of bars to Burger King’s contest to help app users pay off their student loans. This month’s special is news from the …
Wie Restauranttechnologien Innovationen vorantreiben
Go to any chain grocery, and you can see aisle after aisle of consumables available irrespective of season, from strawberries in the heart of the winter to sweet potatoes in the summer. Those conveniences are the fruit of generations of efforts that range from developing irrigation or preservatives …
Was man wissen muss, um eine Datenpanne im Restaurant zu vermeiden
For as long as there has been technology, there have been people that have looked to exploit vulnerabilities in that system. Attacks on cybersecurity come in all shapes and sizes, from personal attacks aimed at discovering peer-to-peer information in identity theft cases, to more significant …