Browse Definitions :
Definition

property management system (PMS)

A property management system (PMS) is a software application for the operations of hospitality accommodations and commercial residential rental properties. PMS is also used in manufacturing industries, local government and manufacturing. A property management system is sometimes referred to as a hotel operating system or hotel OS.

PMS provides a centralized computer system to organize, schedule and perform the day-to-day functions and transactions involved in accommodations businesses. Computer record keeping and PMS have increased the efficiency of hospitality industries significantly simply by making it possible to update and consult centralized records from multiple computers and devices. PMS solutions have been customized for the needs of the hospitality industry to further increase ease of operations.

Functions managed by a PMS include automation of many common tasks, including:

  • Bookings
  • Check-in and check-out
  • Telephone systems integration
  • Point of sale (POS) integration              
  • Event planning
  • Food and beverage costing
  • Hotel inventory supply management
  • Reporting of key performance indicators (KPI)
  • Security and room locks

Local governments sometimes use PMS to manage numerous properties under their care, where centralized and electronic record keeping greatly increases efficiency. Facilities might include schools, sports and recreational facilities, community gardens and parks. In manufacturing, PMS is often used to keep track of materials and supplies, as well as employee-owned property and equipment.

This was last updated in October 2018

Continue Reading About property management system (PMS)

Networking
  • network traffic

    Network traffic is the amount of data that moves across a network during any given time.

  • dynamic and static

    In general, dynamic means 'energetic, capable of action and/or change, or forceful,' while static means 'stationary or fixed.'

  • MAC address (media access control address)

    A MAC address (media access control address) is a 12-digit hexadecimal number assigned to each device connected to the network.

Security
  • Trojan horse

    In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, ...

  • quantum key distribution (QKD)

    Quantum key distribution (QKD) is a secure communication method for exchanging encryption keys only known between shared parties.

  • Common Body of Knowledge (CBK)

    In security, the Common Body of Knowledge (CBK) is a comprehensive framework of all the relevant subjects a security professional...

CIO
  • benchmark

    A benchmark is a standard or point of reference people can use to measure something else.

  • spatial computing

    Spatial computing broadly characterizes the processes and tools used to capture, process and interact with 3D data.

  • organizational goals

    Organizational goals are strategic objectives that a company's management establishes to outline expected outcomes and guide ...

HRSoftware
  • talent acquisition

    Talent acquisition is the strategic process employers use to analyze their long-term talent needs in the context of business ...

  • employee retention

    Employee retention is the organizational goal of keeping productive and talented workers and reducing turnover by fostering a ...

  • hybrid work model

    A hybrid work model is a workforce structure that includes employees who work remotely and those who work on site, in a company's...

Customer Experience
  • database marketing

    Database marketing is a systematic approach to the gathering, consolidation and processing of consumer data.

  • cost per engagement (CPE)

    Cost per engagement (CPE) is an advertising pricing model in which digital marketing teams and advertisers only pay for ads when ...

  • B2C (Business2Consumer or Business-to-Consumer)

    B2C -- short for business-to-consumer -- is a retail model where products move directly from a business to the end user who has ...

Close