Hoyts serves up food, drink via mobile payment app
- 24 January, 2012 09:34
Sydney Hoyts customers will be the first in the world to pilot a mobile payment application developed by MasterCard called QkR which allows them to order food and drinks without leaving their seat.
QkR will be trialled at La Premiere cinemas in Moore Park and Chatswood in Sydney for three months. Customers who own an iPhone or Android handset will be able to use the service by downloading the QkR app to their phone and make purchases by either scanning the QR code, tapping a near field communications (NFC) device against the QR code on the seat or typing in the scan code.
However, there are no plans to widen the trial to BlackBerry or Windows Mobile users.
Hoyts retail, food and beverage director, Matthew Ezra, said the two cinemas were chosen as they were close to its head office and would be easy to monitor.
“We have 12 premium cinemas across Australia so the aim is to roll this out to all those locations. We believe that this brings in cinema dining to the next level,” he said. “Currently, you can order at the bar and it gets delivered to your seat but now you don’t need to miss the movie.”
Ezra added that if the trial is successful in Australia it would be rolled out to Hoyts La Premiere in New Zealand.
The QkR pilot is the latest partnership between MasterCard and the Commonwealth Bank of Australia (CBA) who recently launched Kaching, a service which allows customers to use their NFC-capable phone to pay at check outs.
In addition to QkR, Hoyts is planning to offer customers who don’t use La Premiere the option of ordering their food online before they arrive at the cinema and is in the process of rolling out what it calls vending cards.
“These cards are for normal cinema goers who want to order food or drink without missing the movie,” he said. “They are linked to a Wi-Fi connection so we’ll bring the vending card in and there are a range of payment methods.”
In August 2010, Hoyts launched Social Tix, a cinema ticket booking app on Facebook that allows users to create events, reserve seats and browse session times through the social networking website.
Follow Hamish Barwick on Twitter: @HamishBarwick
Follow Computerworld Australia on Twitter: @ComputerworldAU
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Spiceworks' free management software gets integrated MDM
Integrated Computing Platforms: Infrastructure Builds for Tomorrow’s Data Centre
Integrated Computing Platforms, such as EMC VSPEX RAs, provide a solution by eliminating the time (and cost) of designing, testing, and engineering integrated environments with components built independently of one another. These validated architectures are ready for production environments upon delivery, and offer a single point of support should IT require it. Learn more on how a leading IT vendor has aligned product innovation with an IT market need to improve efficiency, performance, and value for SMBs.
Clearing the Clouds for Midmarket Businesses
Cloud computing promises to help midmarket companies reduce cost and complexity in the IT equation – and gain the flexibility and agility they need to thrive. Yet charting a clear course to the cloud isn’t always easy. In this paper, we aim to clear the clouds. We examine different cloud computing models, discuss the types of requirements that each can best address, and consider what midmarket businesses should look for in a cloud solutions provider.
Advanced Malware Exposed
This handbook shines a light on the dark corners of advanced malware, both to educate as well as to spark renewed efforts against these stealthy and persistent threats. By understanding the tools being used by criminals, we can better defend our nations, our critical infrastructures and our citizens. This ebook will provide readers with a new understanding of the rapidly developing cyber threat landscape and practical insights into how they can protect their data and computing infrastructures. Download now.