throbber
Apple Inc. Exhibit 1033
`
`

`
`ISBN 0-86612-147-1
`
`90000
`
`J808J 121477
`
`Apple Inc. Exhibit 1033
`
`

`
`MANAGING
`COMPUTERS
`in the
`HOSPITALITY
`INDUSTRY
`
`Apple Inc. Exhibit 1033
`
`

`
`Disclaimer
`
`This publication is designed to provide accurate and authoritative information in regard to the subject
`matter covered. It is sold with the understanding that the publisher is not engaged in rendering legal,
`accounting, or other professional service. If legal advice or other expert assistance is required, the
`services of a competent professional person should be sought.
`-hom the Declaration of Principles jointly adopted by the American Bar Association and a Committee of
`Publishers and Associations
`The authors, Michael L. Kasavana and John J. Cahill, are solely responsible for the contents of this
`publication. All views expressed herein are solely those of the authors and do not necessarily reflect the
`views of the Educational Institute of the American Hotel & Lodging Association (the Institute) or the
`American Hotel & Lodging Association (AH&LA).
`Nothing contained in this publication shall constitute a standard, an endorsement, or a
`recommendation of the Institute or AH&LA. The Institute and AH&LA disclaim any liability with
`respect to the use of any information, procedure, or product, or reliance thereon by any member of the
`hospitality industry.
`
`©Copyright 1997
`By the EDUCATIONAL INSTITUTE of the
`AMERICAN HOTEL & LODGING ASSOCIATION
`2113 N. High Street
`Lansing, Michigan 48906
`
`The Educational Institute of the American
`Hotel & Lodging Association is a nonprofit
`educational foundation.
`
`All rights reserved. No part of this
`publication may be reproduced, stored in
`a retrieval system, or transmitted, in any
`form or by any means-electronic,
`mechanical, photocopying, recording, or
`otherwise-without prior permission of the
`publisher.
`
`Printed in the United States of America
`4 5 6 7 8 9 10 05 04 03 02 01
`
`Library of Congress Cataloging-in-Publication Data
`Kasavana, Michael L., 1947-
`Managing computers in the hospitality industry/Michael L.
`Kasavana, John J. Cahill.-3rd ed.
`p. em.
`includes bibliographical references and index.
`ISBN 0-86612-147-1
`1. Hospitality industry-Data processing. I. Cahill, John J.
`II. Title.
`TX911.3. E4K37 1997
`647.94'0285-dc21
`
`Editor: Richard L. Keener
`
`97-19743
`CIP
`
`Apple Inc. Exhibit 1033
`
`

`
`20 Chapter 1
`
`Exhibit 9 Hospitality Accounting Applications
`
`Accounts Receivable
`Module
`
`r---
`
`-
`
`Customer Master File
`City Ledger File
`Account Aging File
`
`Accounts Payable
`Module
`
`Vendor Master File
`Invoice Register File
`Check Register File
`
`Payroll Module
`
`-
`
`-
`
`Other Modules
`
`Employee Master File
`Payroll Register File
`Government Register File
`
`Inventory
`Purchasing
`Budgeting
`Fixed Assets
`
`Financial Reporting
`Module
`
`General Ledger
`Trial Balance
`Financial Statements
`
`schedules), and a variety of reports for use by management. Exhibit 9 summarizes
`typical hospitality accounting applications.
`
`The Internet and the Hospitality Industry
`The Internet is a large and complex series of computer networks designed to pro(cid:173)
`vide universal access to information and communication services around the
`world. Often referred to as the "information superhighway," the Internet re(cid:173)
`sembles the intricate traffic patterns of local and county roads with connections to
`state and interstate highways. The Internet was initially conceived at about the
`same time as the development of interstate highways. The design of the interstate
`highway system, linking major cities across the country, was based upon the need
`to maintain a continuous flow of supplies throughout the country. The roadways
`were designed with sufficient alternate routing so that a steady flow of materials to
`all parts of the nation could be assured.
`Similar ideas were important in the creation of the Internet. Using the inter(cid:173)
`state highway system as a model, the government turned its attention to similarly
`securing its intelligence system. The focus shifted from protecting vehicular traffic
`
`Apple Inc. Exhibit 1033
`
`

`
`Automation in the Hospitality lndust1y 21
`
`patterns to ensuring a continuous movement of data between mainframe comput(cid:173)
`ers at various strategic locations from coast to coast. Internet planners sought to
`create a myriad of alternate communication routes across a wide range of computer
`platforms.
`
`Internet Applications
`The Internet has created a communications and information explosion with the
`potential to affect virtually every aspect of the hospitality industry. In an office
`environment, most networks connect individual microcomputers to a separate com(cid:173)
`puter, called a server or file server. The file server controls the flow of information
`along the network. It can also be used to establish a gateway to other computer
`networks beyond the office environment. The Internet takes the concept of networks
`to its fullest application by connecting large numbers of very complex networks. The
`Internet is an affiliation of tens of thousands of private, commercial, educational,
`and government-supported networks around the world. When a user connects to
`the Internet, data and information can be shared with millions of other users.
`
`World Wide Web
`The World Wide Web (www), also known simply as the Web, is only one of the
`many different parts of the Internet. It is the best-known part because its user(cid:173)
`friendly features have attracted millions of users. Unlike text-only sites found on
`much of the Internet, the Web offers an incredibly rich combination of text, images,
`sound, animation, and video. The visual options of the Web and the surging num(cid:173)
`bers of" surfers" have enticed thousands of businesses, organizations, educational
`institutions, government agencies, and individuals to create their own Web pages
`and participate in the dissemination of information along the Web. For information
`about the Web sites of specific hospitality organizations, visit the sites listed at the
`end of this chapter.
`Much of the user-friendly nature of the Web stems from the HyperText Trans(cid:173)
`fer Protocol (http) that structures information on the Web. This protocol is a set of
`file download commands embedded within the hypertext markup language (html)
`used to place text, graphics, video, and other information displays on the Web. The
`http indicates that the Web page can handle nonsequential links to other hypertext
`pages.:_a trait characteristic of all Web pages.
`A Uniform Resource Locator (URL) designates the Internet address of a site,
`usually the site's homepage. A site's homepage is the first screen or Web page pre(cid:173)
`sented when a destination site is located. URLs are usually built into the hypertext
`of a Web document, enabling users to jump from site to site along the Web. The URL
`for an organization, hotel, restaurant, club, or individual consists of a series of let(cid:173)
`ters and punctuation marks that may seem confusing, even intimidating, to a nov(cid:173)
`ice Web user. Each grouping of letters represents a section of the path that leads to a
`desired site.
`The best way to find a Web site when you don't know its address is to use a
`search engine. Commonly used search engines include:
`
`Yahoo ............ www.yahoo.com
`
`Apple Inc. Exhibit 1033
`
`

`
`22 Chapter 1
`
`Netscape ......... www.netscape.com
`Web Crawler . . .... www.webcrawler.com
`Net Guide . . . . . . . . www.netguide.com
`Lycos . . . . . . . . . . . . www.Iycos.com
`Excite . . . . . . . . . . . . www.excite.com
`
`A search engine is a software program that reads indexed Web sites and
`creates lists and links to sites that match a user's inquiry. Most search engines pro(cid:173)
`vide tips on how to efficiently search for information. Generally, the more specific
`your query, the more relevant will be the list of sites your query generates. How(cid:173)
`ever, even if the resulting list is long, you can usually scroll or page through the list
`and decide which sites are worth a look. Then it's simply a matter of clicking on the
`link or URL to go directly to the Web document.
`
`Key Terms
`
`Electronic Data Processing
`binary code-A code based on only two digits, zero and one. This is the form of
`data a computer can handle with greatest ease because electronic circuits have two
`natural states: "on," usually represented by the binary digit one; and "off," repre(cid:173)
`sented by the binary digit zero.
`bit-The smallest unit of electronic data. The term is short for Binary digiT (which
`is either zero or one). All characters (letters, numbers, and symbols) are repre(cid:173)
`sented by a special sequence of binary digits.
`byte-A special sequence of bits (electronic data) representing a single character. A
`byte is a group of adjacent bits that work, or are operated on, as a unit. Theoreti(cid:173)
`cally, a byte may be any length, but the most common length for a byte is eight bits,
`with some computers using seven.
`data-Facts or figures to be processed into useful information. Three types of data
`are alpha data, numeric data, and alphanumeric data.
`data processing-A cycle of events identified as input, process, and output that
`transforms raw facts and isolated figures into timely, accurate, and useful
`information.
`gigabyte-Often abbreviated as "Gb," equal to 1,073,741,834 bytes, and commonly
`used to describe computer memory capacity.
`kilobyte-Often abbreviated as "K" or "Kb," equal to 1,024 bytes, and commonly
`used to describe computer memory capacity.
`megabyte-Often abbreviated as "Mb," equal to 1,048,576 bytes, and commonly
`used to describe computer memory capacity.
`microcomputer-Also called a personal computer; despite its relatively small size, it
`contains the same types of components as larger machines and may also have addi(cid:173)
`tional features, such as hard disks, color monitors, graphics capability, and others.
`
`Apple Inc. Exhibit 1033
`
`

`
`102 Chapter 4
`
`Exhibit 6 Sample Reservation Transaction Record
`
`RESERVATION TRANSACTION REPORT
`
`RESV# GROUP UNIT PC
`
`REF. EMP FOOD/PAl $ DATE TIME CC RESV#
`
`1999
`1999
`2000
`2000
`2000
`2005
`2005
`2008
`2008
`2008
`2008
`2008
`2008
`2008
`2008
`2076
`2076
`
`0
`0
`1996
`0
`1996
`1996
`1996
`1996
`1996
`1996
`1996
`1996
`1996
`1996
`1996
`0
`0
`
`12356487
`12345678
`
`12345678
`
`403
`403
`106
`504
`106 12
`511
`511 12
`215
`1
`215
`7
`215
`7
`11
`215
`215 11
`2 15
`11
`215 11
`215 12
`506
`1 TA999988
`506
`
`215, 1
`215, 1
`215, 1
`215, 1
`215, 1
`215, 1
`
`3
`3
`3
`3
`3
`3
`3
`3
`0
`0
`0
`0
`0
`0
`3
`3
`3
`
`1500
`0327
`0327
`0
`1211
`- 1000
`0327
`0
`1000
`0614
`-1 000
`1211
`1000 0614
`-21150
`1211
`450 0608
`450 0609
`9500 0608
`375 0609
`375 0608
`9500 0609
`500 0614
`- 50000 0703
`-52040
`1211
`
`1216
`1216
`1646
`1217
`1055
`1646
`1055
`1647
`0907
`1 049
`0907
`1 049
`0907
`1 049
`1055
`1449
`1645 DC
`
`1999
`1999
`2000
`2000
`2000
`2005
`2005
`2008
`2008
`2008
`2008
`2008
`2008
`2008
`2008
`2076
`2076
`
`Source: Lodgistix, Wichita, Kansas.
`
`Exhibit 7 Sample No-Show Report
`
`ACCT ROOM TYPE S GUEST NAME
`
`FIRM{fA NAME
`
`PLAN ARR DATE DEPRT RESERVED
`
`lATA#
`
`1964
`
`1003 SUTE 3 HUTCHINGSON. MR. AND CAMELBACK TRAVELS
`ADDRESS 1 LINE)()()()()( CITY FIELD)()()()()(
`ST
`
`03-27
`
`03/26
`03/30
`DC 65465488716165487
`
`25478
`
`88865555
`
`1985
`
`CAMELBACK TRAVELS
`1003 SUTE S LEXINGTON, PHILLIPC
`ADDRESS 1 LINE XXXXX CITY FIELD XXXXX
`ST
`
`25478
`
`03/27
`
`03/26
`04/01
`DC 65465468716165487
`
`88885555
`
`1986 2002 DDBL 3
`
`LIVINGSTON, JONATHAN MUSSELSHELL VALLEY
`ADDRESS 1 LINE SSSSS CITY FIELD DDDDD
`ST
`
`21547
`
`MUSSELSHELL VALLEY
`1987 2002 DDBL S LIVINGSTON, ROBERT
`ADDRESS 1 LINE SSSSS CITY FIELD DDDDD
`ST
`
`21547
`
`1989
`
`110 QUEN 3
`
`JENKINS, ROBERT
`ADDRESS LINE 1
`
`FIRM LINE
`CITY FIELD
`
`ST
`
`565466
`
`1994
`
`501
`
`KING 6
`
`JORGENSON, MICHAEL
`ADDRESS1 LINETEST
`
`FIRM LINE TESTDDDDDD
`CITY FIELD
`ST
`
`321311
`
`03/27
`
`03/27
`
`03/27
`
`03/27
`
`03/26
`03/31
`AX 32165414651654365
`
`77776666
`
`03/26
`03/31
`AX 32165414651654365
`
`77776666
`
`03/27
`03/27
`DC 64321646432164643
`
`03/27
`CA
`
`03/27
`
`2012
`
`101
`
`KING C WEST, MR. KERRY
`1938 N. WOODLAND
`
`LODGISTIX INC.
`WICHITA
`
`KS
`
`58201
`
`03/27
`
`03/27
`03/30
`AX21257464326454246
`
`Source: Lodgistix, Wichita, Kansas.
`
`Individuals with microcomputers are presently able to place their own reserva(cid:173)
`tions via the Internet. Soon, consumers may use this same technology for all travel(cid:173)
`related needs. Interactive television-based self-reservation systems allow users with
`
`Apple Inc. Exhibit 1033
`
`

`
`Computer-Based Reservation Systems 103
`
`satellite capabilities to retrieve computer-stored reservation packages and view them
`on their television screens or display monitors. These reservation programs typically
`require users to respond to a series of questions. Users may enter their responses
`through a specially designed keypad, touch-tone phone, or infrared remote control
`device, and thereby create their own bookings.
`Currently under development are interactive multi-media and virtual reality
`presentations for independent travelers, meeting planners, and travel agents. Com(cid:173)
`panies are developing digitized maps and property photographs as well as full(cid:173)
`motion property tours that can be displayed on a screen and viewed by clients as
`they make travel decisions.
`Experimentation with verbal recognition/ synthesis technology (talking com(cid:173)
`puters) is promising and may significantly affect hotel reservation modules in the
`near future. Research is presently being conducted that requires users to possess a
`touch-tone telephone, a headset, and a display screen. The reservations program
`generates a series of cues on the screen to which the potential customer responds by
`pushing designated buttons on the telephone or speaking into the mouthpiece of
`the headset. The computer acknowledges the user's input and may generate an
`additional series of cues. Although these computer programs presently use and un(cid:173)
`derstand only a limited vocabulary, the future looks bright for this application.
`
`Reservations Through the Internet
`
`Many airlines, hotel companies, and car rental firms offer online reservation ser(cid:173)
`vices through their Web sites. This enables travelers from many different market
`segments to use their personal computers to book flights, reserve hotel rooms, and
`select rental cars. Vacation travelers, business travelers, corporate travel offices, in(cid:173)
`ternational visitors-all are able to use the World Wide Web to arrange for their
`own travel and accommodation needs. The variety of potential guests accessing
`Web sites to place reservations has prompted travel and hospitality companies to
`develop simple, user-friendly reservation procedures.
`Exhibit 8 presents a series of screens that walk prospective guests through the
`process of reserving rooms from the international Web site of Holiday Inns, Inc.
`(http:/ / www.res.holiday-inn.com). In this particular reservations process, users
`first identify the area of world relevant to their travel needs and then narrow down
`their destination, first by country and then by city. The city screen provides a listing
`and description of hotels. After selecting a hotel, users input the necessary reserva(cid:173)
`tion information. They can guarantee their reservations by providing personal or
`corporate credit card data.
`The degree of privacy and security of financial transactions over the Internet
`has prompted concern, and, in many cases, this concern has limited the volume of
`Internet commerce. Security procedures exist today and will become even more so(cid:173)
`phisticated in the future. When users access online reservation systems, Web
`browsers generally provide a security alert similar to the following:
`
`You have requested a secure document. The document and any information you
`send back are encrypted for privacy while in transit. For more information on se(cid:173)
`curity choose Document from the View menu.
`
`Apple Inc. Exhibit 1033
`
`

`
`104 Chapter 4
`
`Exhibit 8 Holiday Inns, Inc., Online Reservation Screens (http:/ /www.res.
`holiday-inn.com)
`
`- -
`
`Make A Reservation
`,
`~»- ~
`Where would you like to go?
`
`~---
`
`'
`
`'
`
`---- ~--
`
`Mh-
`
`Select a location from the flags or the links below:
`
`• CANADA
`
`WORLD
`
`You may make an unsecure reservation ifyou wish to.
`
`Which Country Would You Like To Go To?
`
`You May Select A Location From The List Of Countries Below
`
`Find your Holiday Inn hotel by choosing the city you wish to visit, the highway on your travel route, or
`the attraction you wish to stay near (u.mally only one hotel per atlraction is listed) .
`
`• Select by City
`
`Select by Highway
`
`Select by Attraction
`
`Ji
`•Airlglelnltlilnlaiiiiiiiiiiii .. M
`,.Aruba
`Aus t ria
`Bahrain
`Belgium
`Brazil
`Caribbean
`Cayman Islands
`Chile
`
`Select a country and press :
`SEARCH COUNTRY
`
`Clicking on the "View" function from the browser's toolbar activates a drop-down
`menu that includes "Document Information" as a selection choice. Clicking on this
`function provides security information about the document in question.
`In addition to providing a user-friendly reservations process and securing
`transactions, online systems also perform important marketing functions for the
`hospitality company. Reservation features of many Web sites enable users to access
`
`--
`
`Apple Inc. Exhibit 1033
`
`

`
`Computer-Based Reservation Systems 105
`
`Exhibit 8
`
`(continued)
`
`We make your trip easy.
`[AUSTRALIA]
`
`Choose a City you would like to visit:
`
`ADELAIDE
`CAIRNS
`DARWIN
`HAMILTON ISLAND
`MELBOURNE
`PERTH
`
`TERR I GAL
`
`l
`
`~----S_e_a_r_c_h ___ f_o_r __ h_o_t __ e_l_s ____ l I Reset
`
`Your Hotel Selections
`
`We have 2 hotel(s) in the atea you have selected:
`
`SYDNEY -COOGEE BEACH, AUSTRALIA
`
`242 ARDEN ST
`SYDNEY COOGEE
`AUSTRALIA
`2034
`61-2-315-7600
`61 - 2-315 - 9100
`
`Address
`
`Phone No
`Fax No
`
`Features of this hotel:
`
`• Whirlpool
`• Suites Available
`• Near A Beach
`
`Earliest check-in time -
`Check-out time
`Nearest downtown
`Distance from downtown -
`Nearest airport
`Distance from airport
`
`-
`
`2 PM
`NOON
`DOWNTOWN SYDNEY CBD
`9 MI
`SYDNEY INTL AIRPORT
`6 MI
`
`Check Availability
`
`-
`
`Apple Inc. Exhibit 1033
`
`

`
`106 Chapter 4
`
`Exhibit 8
`
`(continued)
`
`What Are Your A ailability Requirements?
`
`DNEY-COOGEEBEACH AU TRALJA
`l,ln H
`
`(Only 0 I 1l!h bi MWRJ"' booki•-,g jy a1/u.•'ed1
`'I
`11111her Oflllglll!l: • I
`2
`$
`j
`(l
`,-
`Numbet or mot••~·
`l
`;;:
`1
`4
`N11nober oh . .duii!IL • I
`4
`~
`J
`Room Pn::fel'l!iloXc
`• , Oo J:loloilnj;
`Smo DB
`
`6
`
`7
`
`7
`
`8
`
`q
`
`10
`
`You rna · optionall ' enter a Prionty Club nunJber and one of the
`following two:
`
`(\'alid:lD will be quir d at time or he:o.:k·ln
`
`Pnority Dub Membef
`
`· ~, nmbc:
`
`W orid\I!Nle
`
`qJOrate
`
`o;;cOWll
`
`A.lumnl M!!lme Traveltw" 1'"1 O!!J'llnl
`
`[__ Check Availability
`
`Boo
`
`our Room Online
`
`Booking Inform tion
`
`JLo•_el !:iol act.ad
`
`'""""
`l:v<>h
`ot oa~"'
`lf
`.R.u~, •\r...,
`t;tr:eoce
`It IJIDba.t. 0 r oun..
`~~e= ot adul~a
`
`1 ~--C'CXlttE! .BEAC!I , IIIJ.S'liiJ;l;U.
`1 Dec-...., ~~
`r 1
`
`Rate and v Ha.billty Details
`
`'Ral<d q11o 1 rd for l penon DO 1 Ad{ (
`
`ll TRALlo\ 1 per room IO In diidrd.
`
`A.ll~ i obl .. .RoaD T"f'l*• '
`"Yfl• o• i1
`•
`ttlfG L[;f5iJRE
`-
`llBL B-0!!
`-:::BD POOr.n T r~t~;
`;lED '\It
`
`? -P
`.Z.I"rl.,..
`-lrt 00
`L . 00
`2 (j:, _ co
`~~~. C{l
`
`Elihu ·pt..,onh} ' 1Lorgt:l5 00 DOt.f.AR ji\US !lALlA) for ~1: 6o<~li!JV!!• ~pel
`l'er~o~ I \land u11de1 L!o J ~
`f bill ClltoU!IkiJ ~nor IO 6p111 OOlellune OD ~~~ I I Of )'UIII cre<f t:lll d will
`Cllli eii1Uin" l'oli M
`be bllled lor 1 , ·grlll.
`
`Apple Inc. Exhibit 1033
`
`

`
`Computer-Based Reservation Systems 107
`
`Exhibit 8
`
`(co ntinued)
`
`Please enter the following information
`
`First Name
`
`Last Name
`
`Address(Apt/Home/Street):
`
`City
`
`District/ State/Province
`
`Zip/Postal Code
`
`Country
`
`Phone Number
`
`Please choose Guarantee Method:
`
`Guarantee to Travel Agency
`
`Travel Agency lATA/ARC Number
`
`• American Express
`Master Card
`Carte Blanche
`Air Canada
`
`Visa
`Diners Club
`Discover
`JCB Card
`
`Credit card #
`Expiration date ~~1997 ,,,
`
`To make the Booking click ========-> I Book
`To clear what you ent ered click ==.:o::> I Reset
`
`J You can also call 1-800-HOLIDAY if you are calling from the US, Canada, Puerto Rico or the
`US Virgin Islands. Elsewhere, call your nearest Holiday Inn Reservation Office.
`
`detailed pictures of individual hotels. Some enable users to download multimedia
`presentations of the features and benefits of the hotel chain and of individual
`hotels-complete with a "walk through" of the property and a detailed look inside
`the various types of rooms and services offered .
`
`. . Key Terms
`affiliate reservation system-A hotel chain's reservation system in which all par(cid:173)
`ticipating properties are contractually related. Each property is represented in the
`
`Apple Inc. Exhibit 1033
`
`

`
`168 Chapter 7
`
`Wireless Terminals
`Wireless order-entry terminals are revolutionizing POS technology. When these
`terminals are small enough to hold in one's hand, they are called hand-held termi(cid:173)
`nals (HHTs). When they are as large as the size of a normal terminal keyboard,
`they are called portable server terminals. These devices perform most of the func(cid:173)
`tions of a precheck terminal. Wireless technology can be a major advantage for
`large establishments with drive-through facilities, long distances between service
`stations, outdoor dining areas, or very busy lounges where it is difficult to reach a
`precheck terminal. In any establishment, service may be quicker because servers
`do not have to wait to use a precheck terminal during peak business periods and
`orders can be entered at tableside.
`Two-way communications not only allow a server to include special instruc(cid:173)
`tions, such as "no salt" or "medium rare" as part of an order, but also can immedi(cid:173)
`ately alert a server if an item is out of stock. Typically, when an order is ready for
`pick-up, the server receives a signal on the hand-held unit. In some cases, appetiz(cid:173)
`ers and drinks may be ready just seconds after a server has finished entering the
`orders and left the table.
`Since all items must be entered through the server's hand-held unit, the fre(cid:173)
`quent problem of coffee or desserts inadvertently left off guest checks can be elimi(cid:173)
`nated. Some units enable managers to monitor service through their own
`hand-held devices.
`Exhibit 3 diagrams one type of hardware configuration for hand-held server
`terminals. The hand-held units have low-frequency FM radio transmitters and re(cid:173)
`ceivers. As orders are entered at the guest's table, analog signals are sent to antenna
`units located within the dining area. These antenna units relay the analog signals to
`a radio base station where a modem converts the analog signals into digital signals
`that are cabled to the restaurant computer system processing unit. From the restau(cid:173)
`rant computer processing unit, signals are relayed to remote work station printers
`or kitchen monitors.
`Up to four antenna units may be connected to one radio base station. Before
`installation, a site survey should be conducted to determine the optimum locations
`for each antenna unit. The amount and location of metal structures in a restaurant
`are important installation concerns. Generally, each antenna unit requires separate
`cabling to the radio base station.
`A charged battery pack powers each hand-held server terminal. Fully charged,
`these battery packs may last for eight hours. It is recommended that two fully
`charged battery packs be available for each hand-held unit.
`
`POS Printers
`
`Cashier terminal printers are sometimes described as either on-board or remote
`printing devices. On-board printing devices are normally located within six feet of
`the terminal that they serve. These devices include guest check printers and receipt
`printers. Remote printing devices include work station printers and journal printers
`that are located more than six feet from the terminal that they support. These print(cid:173)
`ing devices require separate cabling.
`
`Apple Inc. Exhibit 1033
`
`

`
`Exhibit 3 Hardware Configuration for Hand-Held Server Terminals
`
`Food and Beverage Applications- SeJTi(·e 169
`
`Hand-Held Server Terminals
`
`'-
`\___ \__
`
`-.____./
`
`'---./
`
`_)
`
`__;
`J
`
`___) 0
`"-.____/ ~ ~ ~
`
`0
`
`Antenna
`Unit
`
`Antenna
`Unit
`
`Antenna
`Unit
`
`Antenna
`Unit
`
`Central Processing Unit
`
`Work Station Devices
`
`One of the most important peripheral devices in a POS system with remote work
`station devices is the printer controller, also called a network controller. A printer con(cid:173)
`troller coordinates communications between cashier or precheck terminals and work
`station printers or remote monitors, while ensuring that servers need only enter their
`orders once. Exhibit 4 diagrams the function of a printer controller.
`When several precheck terminals send data to the same work station printer or
`remote monitor simultaneously, the printer controller processes data from one of the
`terminals immediately and temporarily stores (buffers) other communications until
`
`Apple Inc. Exhibit 1033
`
`

`
`Selecting and Implementing Computer Systems 285
`
`• Billing statements
`•
`Payroll checks
`
`It is important that management give early attention to this area of computer
`system design. If management waits too long, it could lose control of the situation.
`When this happens, the capabilities of the computer system control management's
`preferences, rather than management's preferences controlling the capabilities of
`the computer system.
`
`Determining the Hardware Configuration
`Hardware configuration refers to the design and layout of the hardware compo(cid:173)
`nents of a computer system. The size of a hospitality operation and the number of
`departments needing access to the computer system are significant factors in
`selecting the appropriate configuration of hardware components.
`A very small hospitality operation may find that a single workstation with a
`personal computer (PC) is sufficient to meet the needs of its limited number of us(cid:173)
`ers. This workstation would be a complete system with input/ output units, a single
`CPU, and external storage capability.
`Other hospitality operations may have a number of user groups from different
`departments that need access to the computer system. They can avoid spending un(cid:173)
`necessary funds on computer equipment by selecting the particular configuration
`of hardware components that best meets the needs of their operations. In many
`cases, it is possible for users to share output devices (such as printers and external
`storage facilities) or the internal memory and processing capability of a central
`processing unit.
`The advantages and disadvantages of each configuration should be consid(cid:173)
`ered before purchasing a computer system. The major differences among the vari(cid:173)
`ous configurations are speed and cost. The CPU is the most expensive component
`in a computer system; therefore, the more CPUs a configuration requires, the great(cid:173)
`er its cost will be. The tradeoff in configuring a number of CPUs, however, is that
`the closer the CPU is to the II 0 devices, and the fewer II 0 devices making
`demands on the CPU, the faster tq.e computer system will seem to operate.
`
`Stand-Alone Configuration
`A stand-alone hardware configuration creates self-sufficient workstations, each
`with a complete set of the same hardware components. The presence of many indi(cid:173)
`vidual computers at different locations limits communication to sharing data by ex(cid:173)
`changing external storage media (disks). Exhibit 5 diagrams a stand-alone hardware
`configuration. The duplication of hardware components makes this a relatively
`expensive hardware configuration.
`
`Local Area Networks (LAN)
`A local area network (LAN) is a configuration of workstations that enables users
`to share data, programs, and output devices (such as printers). Data sharing facili(cid:173)
`tates system wide communications, and program sharing enables users to access
`
`Apple Inc. Exhibit 1033
`
`

`
`286 Chapter lJ
`
`Exhibit 5
`
`Stand-Alone Hardware Configuration
`
`Workstation
`
`Workstation
`
`Workstation
`
`Workstation
`
`infrequently used programs without the loss of speed or memory capacity that
`would result from the installation of those programs on their machines. From an
`economic perspective, device sharing is perhaps the most important benefit de(cid:173)
`rived from networking. Expensive peripheral devices, such as high capacity stor(cid:173)
`age devices and color laser printers, are available to all workstations cabled within
`the network.
`While there are many different types of networks, a client -server network links
`a single powerful computer (the server, sometimes referred to as a file server) to
`several (dozens or even hundreds) less powerful computers (the clients). The server
`controls the flow of information along the network. It can also be used to establish a
`gateway to other computer networks beyond the office environment. Clients access
`a variety of programs loaded in the server and draw upon the server's processing
`power to perform tasks more quickly and more efficiently than if they operated in a
`stand-alone fashion. For example, the transfer of sales data from a food and bever(cid:173)
`age POS system to a LAN allows for detailed analysis of the data without affecting
`the ongoing operation and speed of the POS system. Timely management reports
`can be processed without disrupting the speed and quality of service to members
`dining throughout the property. Exhibit 6 diagrams the components of a typical lo(cid:173)
`cal area network. The network operating system (NOS) of a LAN often supports
`email capability among the configured workstations.
`
`Apple Inc. Exhibit 1033
`
`

`
`Selecting and Implementing Computer Systems 287
`
`Exhibit 6
`
`Local Area Network (LAN) Diagram
`
`Workstation
`
`Workstation
`
`Workstation
`
`Portable Workstation
`
`Workstation
`
`lntranets Through the Internet
`While the Internet is not usually described as a computer hardware configuration, its
`impact on configurations and networks has been, and will continue to be, important.
`The Internet is an affiliation of tens of thousands of private, commercial, educational,
`and government-supported computer networks around the world. Likened to an in(cid:173)
`terstate road system, the Internet is a network of networks, connecting an ever-grow(cid:173)
`ing number of regional sites to an international superhighway of communications and
`information.
`An intranet uses Internet technology to create a private network that forms a
`single company-wide information system. While internal users of the intranet can
`move beyond the system to the Internet at large, Internet users outside the compa(cid:173)
`ny can be prevented from accessing the company's intranet information system.
`Specific hardware and software can be used to create a "firewall" around an intra(cid:173)
`net that prevents external users (and some internal users as well) from accessing
`
`Apple Inc. Exhibit 1033
`
`

`
`288 Chapter 11
`
`sensitive company data or shared project files of work groups. As the intranet of a
`very large company connects many different and independent LANs, the intranet
`becomes very similar to the Internet-but now as a private network of networks.
`Two of the major challenges facing current and future intranet development
`are seamless connectivity and security. Intranets must successfully integrate vari(cid:173)
`ous network operating systems used by the different LANs within the company.
`This can become a considerable challenge, especially if older networks maintain
`important data needed throughout the company.
`
`Proposals from Vendors
`After translating information needs into computer system requirements, manage(cid:173)
`ment is ready to request proposals from vendors. A request for proposal (RFP) is
`typically made up of three major sections. The first section tells the vendor about
`management's business operations; the second section establishes bidding require(cid:173)
`ments for vendor proposals; and the third section deals specifically with user
`application requirements.
`This first section of the RFP should contain an overview of the hospitality busi(cid:173)
`ness, list objectives and broad operational requirements for the computer system,
`and briefly explain the vendor's future responsibilities. This overview

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket