E-Tourism
Topic: Restaurant Management Systems
Overview
Restaurant management systems
The kitchen management system
The delivery restaurant management system (DRMS)
Self-ordering kiosks
Security and compliance in Hospitality Industry
2. OVERVIEW
• Restaurant management systems
• The kitchen management system
• The delivery restaurant management system
(DRMS)
• Self-ordering kiosks
• Security and compliance in Hospitality Industry
3. Introduction
• Restaurant management systems (RMSs) are the
crucial technology components that enable a single
outlet or enterprise to better serve its customers and
aid employees with food and beverage transactions
and controls.
• Restaurant Management Systems (RMS)
4. Restaurant management system
(rms) components
• The size and scope of RMSs vary among organizations.
• There are five main offerings:
– The point-of-sale (POS) system
– The kitchen management system
• Inventory and menu management systems
• Reservations and table management
• Back office applications and interfaces
• Restaurant Management Software
5. RESTAURANT MANAGEMENT
SYSTEM (RMS) COMPONENTS
FIGURE 6-1 Point-of-sale systems such as this from the MICROS Corporation aid servers
and managers in a growing number of ways. Because of their proximity to food and
beverages, POS systems are often built to be more resistant to spills and other
mistreatment than other pieces of technology.
6. Restaurant management system
(rms)
• Other POS functionality
– Decreased service time
– Order accuracy
– Security of cash transactions and internal
auditing functions
– Reduced training burden
– Labor scheduling and performance control
7. The kitchen management system
– Inventory and Menu Management
– Inventory Levels and Consumption
– Purchasing
– Theft
– Benefits of Inventory and Menu Management
– Reservations and Table Management
8. FIGURE 6-2 Restaurants with computerized reservations
systems have more options for handling current and future
business. Current information is just a mouse-click away.
(Source: OpenTable, Inc.)
9. FIGURE 6-3 Table management systems such as this
from OpenTable provide a bird’s eye view of an
establishment as well as specific details of each table.
Armed with this information, management can better
serve its occupied tables and have access to past table
history. (Source: OpenTable, Inc.)
10. The delivery restaurant
management system (DRMS)
• The delivery restaurant management system
(DRMS) is a software and hardware package that
works with the POS and other systems with an
emphasis on the delivery of orders.
• The DRMS was designed a little differently than the
RMS and is divided into three major components:
– Storefront operations
– System functions
– Back office
11. Self-ordering kiosks
• For certain food and beverage segments, kiosks are
seeing increased usage.
• Self-ordering kiosks are stand-alone or networked
devices that mainly allow for order-taking in food
and beverage settings.
– In other settings, they may provide currency,
tickets, or even room keys.
• Self Ordering Kiosks (McDonald)
• Self Ordering Kiosks
12. Proprietary versus
nonproprietary rms
• Proprietary is synonymous with private.
• Proprietary systems come from a single source.
• Mixing and matching software and hardware
from other vendors with these components can
be troublesome, if not impossible.
13. Security and compliance
• With the restaurant industry highly vulnerable to
credit card breaches, the major card carriers
(Visa, MasterCard, etc.) have mandated that
certain steps be adhered to for outlets that wish
to accept credit cards.
– These steps are contained in the Payment
Card Industry Data Security Standard (PCI
DSS).
14. SECURITY AND COMPLIANCE
1. Maintain a firewall
2. Change vendor-supplied passwords
3. Protect customer data
4. Use encryption
5. Use and update antivirus software
6. Develop and maintain secure systems and applications
7. Reduce access to data by a need-to-know basis
8. Assign a unique user ID to each computer user
9. Restrict physical access to cardholder data
10.Track and monitor access to all card holder data
11.Regularly test security systems
12.Maintain a policy that addresses information security