Skip to main content

Home/ Hospitality Technology/ Group items tagged tactics

Rss Feed Group items tagged

anonymous

Cybersecurity Tactics for a Hotel Industry that's Under Siege - 0 views

  • Credit card fraud and identity theft should remain high on the hotel and lodging industry’s radar. Just ask Starwood Hotels & Resorts Worldwide (including their Westin, Sheraton and W Hotel brands), Hilton, Hyatt and the Trump Hotel Collection, all of which were victims of highly publicized, major breaches in the hospitality industry last year. 
  • Hotels need a ‘toolbelt’ of various security technologies that can be used to prevent malicious attacks. A managed firewall is essential, blocking dangerous traffic from coming onto the network and preventing sensitive data from being exfiltrated, or sent, to the hackers.
  • In the breaches mentioned above, point-of-sale (POS) systems were attacked and malware launched to acquire cardholder names, credit card numbers and expiration dates.
  • ...7 more annotations...
  • It can be difficult and expensive to hire and retain an IT security team
  • One way to implement these advanced toolsets includes outsourcing to a managed security firm specializing in this type of service
  • POS systems are a weak security point for many networks because they are constantly in use — and aren’t always patched, updated or protected from vulnerabilities as frequently as required.
  • personal details for hotel guests are frequently stored in a variety of locations, including billing, facilities, restaurants, etc.
  • otels are made even more vulnerable thanks to POS system provider breaches
  •   Phishing remains a particularly popular tactic used by hackers everywhere, including those that are targeting the hotel industry to trick both prospective guests, who give up credit card and personal details, and insiders, who then give up valuable login credentials.
  • File Integrity Monitoring (FIM), Unified Threat Management (UTM), and Security Information and Event Management (SIEM) should also be considered
  •  
    This article talks about how there is a serious concern in the hotel industry when it comes to credit card and identity theft. They talk about how all the major brands in the hotel industry were all victims of highly publicized, major breaches in the last year alone. Also, including airline and banks, hotels maintain a wealthy amount of database of personal and financial data. For example, with new technology systems being created, POS systems are a weak security point for many networks because they are constantly in use and are not always updated or even protected from vulnerabilities. The article talks about personal details for hotel guests are frequently stored in a variety of locations including restaurants, facilities, and government buildings, so hackers have a greater possibility to access your personal information. The bigger hotels are in more danger because of the volume of guests that come in and out of the location. Smaller hotels should be concerned not just about their security but also by ransomware, an increasingly favorable tactic to extort hoteliers by hackers who encrypt the hotels data making it inaccessible until ransom is paid for. I believe hotels need a toolbelt of various securtiy technologies that can be used to prevent future malicious attacks. I think by managing and implementing a firewall is essential which helps get rid of dangerous traffic from coming onto the network and preventing sensitive data from being hacked.
  • ...1 more comment...
  •  
    This article talks about the weakness and vulnerability of POS systems involving safety. It mentions the security breach that few companies, such as Starwood Hotels & Resorts Worldwide (including their Westin, Sheraton and W Hotel brands), Hilton, Hyatt and the Trump Hotel, faced last year (2016) involving credit card fraud and identity theft through their POS systems. It mentions how point-of-sale (POS) systems are not complete safe and how vulnerable they are because they are constantly in use and aren't always patched, updated, or protected from vulnerabilities as frequently as required. It suggests that enterprises should outsource their cyber security management to minimize costs, considering that is extremely expensive to hire and retain IT security team.
  •  
    MOD 10: This article discusses the main tactics of cyber hackers that target hotels. Point of sale (POS) systems are easy targets for hackers due to their constant use during operation hours and because of that their security measures aren't always up to date. Hotels have large data banks since they're storing consumer profile information such as home addresses, phone numbers and credit card numbers. There's a large risk when it comes to security breaches within franchises because they have access to their parent company's regional, national and global systems. If their systems are hacked and breached, then that puts the whole system of the brand at risk. Security breaches within a system can also damage a brands reputation with the public. According to the article, "Recent major breaches at Fortune 500 companies and household names across the retail, restaurant and hotel sectors demonstrate that anti-virus, anti-malware and firewalls alone are not enough to secure businesses from the ever-evolving threat landscape." Smaller properties are even at a greater risk because not only do they have to monitor their compliance with PCI but also monitoring their security systems for their database and PMS system. Some of the recommended software's that should be used by hotels looking to be proactive with their company's cyber security is File Integrity Monitoring(FIM), Unified Threat Management(UTM), and Security Information and Event Management(SIEM).
  •  
    This article explores the different tactics hotels should use after a cyber attack. The article mentions several different type of attacks such as Phishing when hackers trick customers into giving up their login credentials. Ransomware, when hackers encrypt data making it unusable and inaccessible for the hotel. Not one solution but rather companies should be equipped with a series of technologies from firewalls to file monitoring programs. Some of these technologies, like SIEM requires an intelligent IT team to have the capabilities of analyzing and monitoring the reports produced. This may be more difficult for smaller businesses to implement and maintain.
Morgan Staley

4 Marketing Tactics Hotel Event Managers Need to Succeed | Ungerboeck Software - 1 views

  • By providing memorable service, sharing best practices, proactively solving problems, and leveraging social media to make less work for your client, you can position your hotel as customer-focused venue that meeting and conference planners are anxious to work with
  • where hotel and event organizers meet one another face-to-face
  • The ability to pivot or enhance your event at the press of a button used to be nothing more than a meeting and conference planner’s dream
  • ...1 more annotation...
  • Hotels know that when it comes to these conference add-ons, experienced event planners always come to the table ready to negotiate
  •  
    This article discusses marketing tactics to improve events. The pre-con meeting with other staff members is key to making sure everything is communicated to the proper departments. Another great tactic is add-on's during the meeting. Marriott invented Red Coat Direct which allows immediate on site ordering of additional supplies or requests. Anticipation of needs is a must. Being able to negotiate comps is a wonderful way to enhance the meeting experience. Lastly, being able to utilize free marketing by encouraging attendees to post on their own social media is a wonderful way to spread the word. Using meeting hashtags is a great way to entice engagement.
deranique

Top Proximity Marketing Tactics And Tools For 2023 | MarTech Cube - 0 views

  • Proximity marketing is an instant and personalized solution that helps to engage consumers and understand their buying behavior which enables buyers to make purchasing decisions.
  • Proximity marketing is also known as hyper-local marketing. This marketing tactic helps consumers get notified of offers, coupons, and discounts allowed by certain stores or shops specifically designed for that particular individual. Personalized advertising is restricted to the specific local area based on the technologies like Bluetooth, beacon, WiFi, geofencing, near-field communications (NFC), and QR codes.
    • deranique
       
      Provides definition & A list of the various form of connectivity to current and future customers.
  • Why is proximity marketing important? Business entities can easily target consumers by geotargeting feature Increases engagement by just downloading mobile applications Bluetooth/beacons help to pitch products through app notification Proximity marketing allows a competitive advantage for marketers Push notifications pop up and initiate communication with consumers Proximity marketing offers a personalized experience to consumers
    • deranique
       
      The importance of proximity marketing to the consumer and company.
  • ...11 more annotations...
  • Hyperlocal marketing is useful to target potential customers with more customized advertisements based on buying patterns.
  • Proximity marketing tools & tactics also analyze the particular location and influence consumers’ purchase decisions in the near future.
  • Local advertising consists of small shops, local area marketers, shopping complexes, city blocks, store outlets, and small places where businesses pitch and promote their products and services.
    • deranique
       
      Various things that are marketed using advertisements.
  • QR codes
  • WiFi
  • Bluetooth Beacons
  • NFC
  • Geofencing
  • RFID
  • A proximity marketing strategy is highly useful for business owners to influence local area consumers.
  • The objective of proximity technology is to improve the consumer experience with more interactions. Utilizing timely and physically relevant data is key to the success of hyperlocal marketing strategies.
  •  
    I like how this article broke down proximity marketing and which tools it targets for different consumers. I also enjoyed the graph is used for popular proximity marketing solutions. This article helped me understand this concept a bit more and in an easy way
rderonville

Cybersecurity Tactics for a Hotel Industry that's Under Siege | News | Hospitality Maga... - 1 views

  • Credit card fraud and identity theft should remain high on the hotel and lodging industry’s radar.
  • n addition to airlines and banks, hotels maintain a rich database of personally identifiable and financial data on file.
  • POS systems are a weak security point for many networks because they are constantly in use — and aren’t always patched, updated or protected from vulnerabilities as frequently as required. As a result, they can be exploited for the credit card data held on the POS terminals.
  • ...4 more annotations...
  • Reputational damage and revenue loss from a breach headline not only impact individual edge locations, but the corporate brand as well.
  • Hotels need a ‘toolbelt’ of various security technologies that can be used to prevent malicious attacks. A managed firewall is essential, blocking dangerous traffic from coming onto the network and preventing sensitive data from being exfiltrated, or sent, to the hackers.
  • One way to implement these advanced toolsets includes outsourcing to a managed security firm specializing in this type of service
  • If used correctly, hotels could see anomalies that could lead to breaches prior to any damage being done — allowing them to halt hackers in their tracks.
  •  
    Hotels POS systems are at risk for customers. Hackers are using tactics like Phishing and ransomware. Hotels must take action and arm themselves with a "toolbelt" of security options to combat the hackers.
  •  
    This article explores the issues with cyber security in the hotel industry. it is to be taken seriously because customer information is on the line and so is the company's reputation and revenue. Hotels must look into their POS systems because, according to the article, is a weak security point. However, it holds much of the consumer's information like credit card numbers, expiration dates, and etc. The POS system is vulnerable so the secuiry put in place to protect it must be updated. Personal details for hotel guests are stored in many different places in a hotel's many systems. This includes the restaurant, gift shops, billing, facilities, and etc. According to the article, hotels needs a "toolbelt" of various security technologies to prevent malicious attacks. The three mentioned in the article are File Integrity Monitoring, Unified Threat Management, and Security Information and Event Management. Please look into the article to read what each of these systems can do in regards to cyber secuity for the hospitality industry. A good way to implement these tools is to look into outsourcing a managing security firm that specializes in cyber security. This can help minimize and even diminish things that can cause breaches in systems. In my opinion, this article gives solutions to hotels in regards to cyber security. Sometimes installing a firewall or antivirus is simply not enough. A security firm that specializes in this area can be considered. It may be expensive depending on the business to do that, however, it will be even more expensive to have a tarnished reputation for not securing customer information and to deal with lawusuits.
Jessica Rodriguez

4 Tested Mobile Tactics to Grow Your Restaurant's Business - Smart Insights Digital Mar... - 0 views

  • Customer engagement is crucial when it comes to millennials.
  • Mobile food ordering apps are quickly becoming an excellent investment.
  • Loyalty programs are becoming a must.
  • ...1 more annotation...
  • Mobile is just another means of connecting with your customers in a more direct way than you were able to before
  •  
    Week 6 Diigo - This article was all about how the use of mobile devices can grow a restaurant's business. The four tactics that were discussed were engaging with customers on their level, offer mobile ordering,stay connected with customers, and offer loyalty programs. Engaging with customers includes posting and responding to customers on social media websites, creating a personal connection with customers. Offering mobile ordering allows for customers to have quick and convenient access to your food. This gives them the ability to still choose your restaurant even if they are on a time crunch. Staying connected with customers involves sending out reminders to customers about specials, coupons, etc to encourage them to remember your restaurant and choose to go to it. Lastly, offering loyalty programs will encourage customers to visit your restaurant more than usual just to receive the free perks that come with the loyalty program.
da7327

Driving Ancillary Revenues With Your Hotel Property Management System - StayNTouch - 0 views

  • Today, through the use of SaaS hotel property management systems, hotels have the flexibility to exceed service expectations and still increase their top line revenues.
  • Even before a guest checks in, cloud-based hotel technology enables you to send relevant offers that the guest may want to purchase pre-arrival.
  • By offering these types of options, you are giving greater choice to the guest and enabling them to personalize their stay on their own terms
  • ...7 more annotations...
  • we still need to use the collective data to proactively engage with guests and give them what they want, plus a little bit more.
  • Having all this data at your fingertips ensures that you can guide the guest through the journey that he or she may find most attractive.
  • Upselling isn’t just a sales tactic; it’s a guest happiness tactic that can help you build deeper relationships with guests by delivering more value.
  • By delivering what the guest wants, when they want it, the hotel will invariably garner better reviews and win loyalty based on great experiences, not on points.
  • by aligning your hotel with a technology infrastructure that provides these types of guest relationship enhancers, hotels will ultimately come out on top.
  • By having employees use mobile devices to check-in guests or facilitate special requests to another department, it ensures that the rapport between the guest and the hotel can solidify and flourish
  • Whatever type of guest your hotel caters to, you must ensure that you have tools and processes in place to deliver the level of amenity that the guest chooses – whether it be high touch, no-touch or somewhere in between.
  •  
    This article introduces the role of PMS(property management system) to increase ancillary revenue. PMS encourages hotels to be competitive with high-end technology, and to provide the service beyond guests' expectations, which in turn, increases the top line revenue. The first role of PMS can be related to room upselling. With cloud-based hotel technology, hotel staff can know the guests' preferences, so before check-in, they can figure out the guest preference, and based on that, they can offer upselling. This tactic will be helpful for both guests and hotel because hotel can make ancillary revenue by upselling, and guest can get personalized service. Second, PMS system can track the guest journey through the previous visiting record. PMS has personalized record depending on the guest. It means hotel is able to offer the most attractive journey to guests. Third, PMS helps to solve the problem instantly, which increases guest satisfaction. The Internet and lots of applications at hotel deliver the instant responsiveness, and improve guest gratification. It will be related to better reviews and loyalty toward the hotel. As can be seen here, adopting the developed technology helps the hotel to build a good relationship with guests, and increase the number of loyal guests. Lastly, by having employees use mobile devices to check-in guests and solve special requests smoothly with other departments, it enables to build the strong personal relationship with guests, and enhance trust. Depending on the personality of guests, they might or might not like personalized services. However, it is obvious that hotel should offer the right service based on their need or want, at the right time, without giving any pressure to them. It can be the way to drive ancillary revenue by using property management system properly.
mtedd003

Cyber Security Marketing Tactics That Actually Work - 0 views

  • Whether you want to attribute it to the rise of interconnected devices in the IoT revolution or just the growing instances of cybercrime, the cyber security industry has seen immense growth in recent years and shows no signs of stopping.
  • This should come as no surprise given that the average annual cost of cyberattacks worldwide is about $9.5 million, according to Ponemon Institute.
  • clearly a need for effective cyber security products and services, there are also many solutions on the market, making it more difficult to capture the attention of your target audience.
  • ...22 more annotations...
  • New cyber security companies are popping up all the time in response to the heightened demand. This can make it hard to stand out in the crowd, and it makes it essential for you to communicate what makes your brand different.
  • you also want to be credible.
  • your potential customers need a significant amount of education to understand what threats they face and what solutions they may need.
  • This is especially true given that CEOs and other C-level executives are not as well versed in information security, which can impact a company’s decision to include cyber security as part of their overall preparedness plan.
  • Though there is plenty of evidence pointing to the necessity of cyber security in protecting valuable data, the truth is that many businesses just don’t prioritize cyber security until it is too late.
  • only one in five, or 22% of those surveyed said that they fully incorporate information security into their strategy and planning.
  • data suggests that cyber security marketers must find ways to create a sense of urgency for potential customers
  • Content marketing can help you build credibility while addressing the major challenge of educating your prospects. In order for your content to be effective,
  • ensure that it is unique.
  • Use data in your messaging. 
  • Offering downloadable content like e-books and whitepapers is also an excellent way to convert your site traffic into leads that you can later nurture.
  • Another aspect of downloadable content that you’ll need to consider is the landing page.
  • case studies are one of the most important tactics for B2B companies.
  • Email Marketing
  • Downloadable content like e-books, case studies, and reports that provide readers with a more in-depth understanding of important cyber security topics. Links to your most recent blog posts talking about recent attacks or security concerns and those that break down complex cyber security topics for a wider reading audience. Video content that emphasizes the importance of cyber security and communicates the value of your company’s offering. A digest of relevant articles from reputable industry publications that helps readers better understand hot topics in cyber security. Monthly offers and sales promotions like a free trail, which can encourage prospects to sign up.
  • Webinars are a great way for cyber security marketers to connect with bottom-of-the-funnel leads.
  • interactive element.
  • Webinars can sometimes be costly to produce. However, as with other parts of your marketing campaign, there is also an opportunity to repurpose your webinar to get more out of this content.
  • Paid campaigns are great at accomplishing two goals – amplifying your content marketing efforts and getting prospects to arrive at your demo request landing page.
  • Don’t exaggerate your solution’s results.
  • Blogs are great for attracting prospects in every stage of the buyer’s journey. Try to create some evergreen blog content that will be universally relevant
  • Create an easy-to-navigate library of premium content. 
  •  
    The Cyber-security Market report has predicted worldwide spending on cyber-security will surpass $1 trillion by 2021. This is a result of annual cyber-attacks costing $9.5 million in global damages. The many solutions on the market require cyber-security services to be innovative on how they market. Cyber security companies want to stand out to customers while still remaining credible. Many businesses are also uneducated and/or don't prioritize cyber-security. The use of blogs and downloadable e-books allow marketers to educate while promoting their product. Cyber security marketers have to make sure they have an easy user-interface, use data in messaging, and don't over exaggerate the capabilities of their products.
shineal

Sustainable Hospitality Technology Made Possible - CiHMS - 1 views

  • Sustainable Hospitality Technology Made Possible
  • the tourism sector can be harmful to the local environment due to the excessive tourist demands resulting in a large number of plastics & food wastes, overuse of water and energy supplies, and the social life of the local communities.
  • The fast-paced technology development has eased hospitality in making strides to becoming eco-friendly without leveraging the heavy financial burden. In order to transform into a green industry, hospitality has been gradually tapping into certain tactics to keep up with the sustainable bandwagon:
  • ...9 more annotations...
  • Forgoing daily cleaning
  • With the integration of a motion and temperature camera detector, the central AC system automatically adjusts the hotel’s overall temperature to maintain at a certain level instead of manually setting your AC temperature to a specific degree permanently.
  • Smart energy and water-saving management.
  • Acknowledging your guest in opting out of the daily cleaning properly by rewarding incentive loyalty points or discount vouchers to other hotel facilities would lead to massive cost savings and environmental benefits.
  • Digitize the use of paper
  • Eliminating all menus, reservations, program flyers, and other hotels in-room compendiums and replacing them with a digital guest room tablet or a large touch screen interactive monitor at lobby area would dramatically reduce the number of paper, cardboard, and plastic waste in hotels operations.
  • Effective food waste management
  • The recent technology helps the kitchen come up with an ultimate menu that achieves wasting food supply by tracking records on kitchen waste on a daily basis.
  • Receiving centralized reports to keep you in check for multiple properties in real-time, accessible from anywhere anytime, and trouble-free integration with other hospitality software via Open API are the benefits of a cloud-based hospitality management solution.
  •  
    This article on "Sustainable Hospitality Technology Made Possible" gives detailed tactics on how properties can lower their energy and consumption costs, and reduce waste which ultimately leads to protecting the environment. As explained in the article, this sustainability shift did not occur overnight, but rather through a progressive process that encompasses corporate social responsibilities and consumer sentiment.
emilywest5

Social media and tourism: creating a social media marketing plan | WAM - 0 views

  • Digital marketing in tourism has always been an important factor, just like in hospitality, and is positioned in the epicenter of the user’s tourism experience. Both small and large companies in tourist destinations have to be aware of this and take advantage of the new opportunities that arise in the sector. Tourism and technology go hand-in-hand and we can’t understand one without the other.
  • Trends on social media set the path and companies are required to revise their marketing strategies so that they are present on Instagram, Facebook, and LinkedIn. The numbers don’t lie; there are 4.2 billion social media users around the world and they don’t use social media for just news, laughing at memes, or following celebrities. They are using social media to share opinions, choose travel destinations, and learn about brands. Social media tourism has an audience.
  • Social media allows us to connect with our audience on a much deeper level. You create not just brand awareness with your audience, but also an awareness and a real empathy between the user and the product: a strong bond that brings us loyal clients and creates new business opportunities thanks to mouth-to-mouth, which adds a great value.
  • ...10 more annotations...
  • At the intersection between social media marketing and tourism, it’s very important to plan. Creating strategies, structuring your actions, and linking each new campaign to a concrete goal is key.
  • Your digital marketing plan for tourism can be the key that opens doors to a multitude of new clients, if you know how to do it:
  • Strategy 
  • Tactics
  • Action 
  • Control 
  • Research and contextualize potential clients, analyze and evaluate the shopping behaviors of your clients and their consumption habits, and create a profile with highlighted data
  • We have to know what is happening on each social network, what content is the most successful, which function is the worst, as well as their reach and the engagement that we have within the community.
  • The plan is equal to Visibility + Proactivity + Reputation (P = V + P + R).
  • How do we obtain visibility?
  •  
    This article explains social media in hospitality and tourism. I really loved the explanation of the SOSTAC method which stands for S-Situation analysis/ Who are we? O-Objectives/ Where do you need to go? S-Strategy/ How you'll meet the objectives T-Tactics/ Details of strategy A-Action/Do your thing C-Control/ How did you do. This method was created by PR. Smith in 1990. It was created for digital strategy, and we still use this method nowadays. This technology helps us define our goals and KPI's as well as understand the buying process, what audience we need to cater to to have a successful following and monetary outcome as well as how to keep that momentum.
Paige Hanna

7 Ocean-Friendly Eco Cruises Hitting the High Seas - 0 views

  •  
    Cruises are said to be one of those forms of transportation with the highest carbon emissions. "A typical cruise ship with 3,000 passengers generates 1 million gallons of gray water; 210,000 gallons of sewade; 25,000 gallons of oily bilge water; 100 gallons of hazardous or toxic waste; 50 tons of garbage and solid waste…" This expert just proves how non-ecofriendly cruises can actually be. However, regulations set by the government have now pushed cruises into trying to be more environmentally friendly. This article singles out seven green cruises that have found ways in which they can decrease their carbon footprint on the world. One cruise that has taken on the initiative is Holland America Cruises. With tactics such as towel reuse program and the installation of low-flow showerheads this cruise line has been making a conscious effort to operate green. They even ensure the most fuel-efficient means of travelling by studying tide schedules to maximize fuel usage with shorter routes. Another interesting cruise that pushes for the green initiative includes Celebrity Cruises with its solar powered cruise line. Other tactics used by other cruises include reusing waste cooking oil on heavy machinery, ridding of all plastic water bottles, shutting off engines in the winter time and only buying fish that are sustainably harvested are just some ways these 7 cruise lines have taken a stand to become greener. This responsible effort by these cruise lines not only can work in their favor for marketing purposes with consumers but create a sustainable industry for the future of cruises. Something as crucial as waste disposal in the water can greatly affect the future of the industry if not considered by the cruises today. Could you imagine if every cruise were to just dispose of their waste into the ocean with no sort of eco-friendly thought in their mind? I found this article to be extremely interesting, especially since I have been on a cruise. I had no idea ho
Yawen Zheng

Reaching The Untethered Consumer - Forbes - 0 views

  • Mobile Marketing:
  • That’s why we must abide by some ground rules:
  • Brands that master mobile marketing don’t think of it as yet another channel; they recognize that it’s part of an integrated, multi-channel brand experience.
  • ...3 more annotations...
  • Rather than becoming mono-focused on a single tactic – the mobile app, for example – think about how your customers use their devices and how you can employ the breadth of mobile tactics to reach them – from apps and QR codes to SMS and mobile coupons to mobile payments and augmented reality
  • Let’s face it: the mobile device is our new functional appendage, like the prehensile tail for the digital consumer. We depend on it for balance, to maneuver and, well, simply to hang out. It’s the first thing we pick up when we rise and the last thing we put down before entering the analog slumber. In between, it’s our remote control of life. It’s made us universally connected and accessible.
  • You just cringed, which is evidence of the challenge that marketers face. Mobility makes consumers both infinitely accessible and utterly vulnerable. In life and in mobile marketing, ill-timed, ill-targeted contact is a personal affront. Like the infamous close-talker on Seinfeld, marketers with a tin ear will quickly find themselves alienated from their audiences. That’s why we must abide by some ground rules:
  •  
    Here Forbe magazine offers some tips on how to do proximity/mobile marketing right and some of the advantages. Companies need another marketing avenue to reach customers in this diverse field where competition is so intense. Technological advances will help one stand out in this large crowd.
  •  
    This article give us an idear about use technology to promote marketing. In 21st century the mobile device is indispensable for everybody, for company, we have to keep forefront on technology.
Yoshihiro Kanno

Mobile bookings are booming but are revenue managers keeping up? - 2 views

This article addresses the issue of mobile bookings that revenue managers have to be careful about. Mobile bookings have become very common among customers and the number is still growing. Last yea...

http:__www.hospitalitynet.org_news_154000320_4056102.html

started by Yoshihiro Kanno on 19 May 12 no follow-up yet
jazminesnyder

Guest Column: How Distribution Systems Are Like Seat Belts - Business Travel News - 0 views

  • global distribution systems use old technology
  • their interfaces aren’t quite as attractive as airline websites
  • they still do what they’re designed to do efficiently and affordably.
  • ...4 more annotations...
  • agency portals
  • Are not designed to manage high transaction volumes generated by large TMCs.Do not offer comparison shopping on competing airlines.
  • Its strategy seems to rest in shifting distribution costs to corporate buyers.
  • Building out airline websites, keeping website content updated, investing in agent portals and investing in direct connect technology all come with significant capital expenditures or resource costs.
  •  
    My article this week is about how GDS (Global Distribution Systems) can be compared to a seatbelt. The author opens the article discussing the main reasons we still continue to use seatbelts; even though they aren't the most comfortable or fashionable items to use, they still do their jobs in saving our lives when it comes to a collision of some sort. The author is in favor of GDS and makes the claim that like seatbelts, the GDS may not be the most up-to-date or may not appear to be as nice as other local systems to each individual airline, but they get the job done and there are no other systems out there like it that we know of (no other systems that do everything he GDS system does that is). The main topic of discussion that the article is concerned with is the recent decision made by the company Lufthansa to start charging its customers an additional surcharge for using GDS systems instead of going through its own system. The author clearly makes it know that she doesn't believe Lufthansa when they say they are charging this additional surcharge because GDS is the most expensive channel to go through. "Because there's no reason to think that an airline should expect to distribute its products without any cost, Lufthansa's recent gambit seems more of a tactic for increasing lagging direct distribution... Its strategy seems to rest in shifting distribution costs to corporate buyers" claims Rose, the author of the article. The author also points out some of the draw backs of using agency portals, the main reason being that a customer cannot compare rates of other competitors and that agency portals cannot handle high volume transactions like the GDS can. It is also made known that there are costs that come with other channels as well, like the prices you pay for building airline websites and keeping them updated. The author concludes that "Given the history of negotiations between airlines and GDSs, it's impossible to know whether Lufthansa is using DCC as
lvela051

Digital Marketing Strategies for the Hospitality Industry in Hyderabad - Digital Market... - 11 views

  • It has also been observed that those who embraced digitalization are enjoying profits now.
    • lvela051
       
      The biggest on going trend.
  • Today, if you are in the hospitality industry, there is no way out but embrace the digitalization that has become a part of it.
  • Trend #1: Video marketing
  • ...21 more annotations...
  • ranslate into longer visits to the websites, lower bounce rates, and better conversation and engagement.
  • Trend #2: Social marketing
  • important to promote social marketing to get the company’s reputation up.
    • lvela051
       
      creates brand loyalty.
  • Trend #3: Social Media Marketing
  • immense potential to reveal characteristics about demographic buying behavior and also helps to segment your customers.
  • social media platforms such as Facebook, Tumbler, LinkedIn, and Twitter for research.
    • lvela051
       
      Biggest platforms to advertise.
  • Trend #4: Wearable Technology
  • latest marketing strategy for the hospitality industry.
  • Disney magic band can be used as the key for the hotel rooms, in place of tickets and probably to plan their entire Disney holidays.
    • lvela051
       
      I have tried this and its very convenient.
    • lvela051
       
      Creating reports help to target audience and other aspects of the business.
  • Trend #5: Data Analytics
  • 60 percent on data analytics
  • analysed deeply to reveal customer behavior.
  • better services and stunning performances.
  • Trend #6: Mobile Marketing
  • A majority of the world’s population is constantly browsing on their mobile phones.
    • lvela051
       
      Smart phones and laptops are constantly marketing.
    • lvela051
       
      Standards that can affect and change based on success of the e-marketing.
  • Diversity
  • Safety and Security
  • Legal Issues
  • Demographics
  •  
    The article is highlighting the digital marketing trends in the Hospitality Industry today. Since technology has such a strong presence, in the world we live in, e marketing such as social media, video and social marketing are becoming more important in building brand loyalty. The 6 trends mentioned in the article, are stating how these types of marketing skills have the ability to reach a broader audience and also helps to provide real-time data on how the company is performing. The use of this marketing strategy is creating higher profits and increasing the standards within the hospitality industry. Hoteliers have a bigger focus on legal issues, safety and security, diversity and demographics and the value that such technology brings or adds to the business. A great example used within the article is the use of social media, i think this is the most effective and cost effective tactic. It doesn't take much to have the marketing department create a social media platform(s) and try to advertise via e-flyer, e-menus and even videos that help to increase sales. The use of e-marketing allows a company to reach a bigger audience then just locally. There are plenty of shops that start off small but gain massive success with advertising online. Best example would be Salty Donuts, main source of advertising being social media.
lvela051

HITEC panel: Technology investment requires direction, clear goals | Hotel Management - 0 views

  • Technology investment requires direction
    • lvela051
       
      Going into the wrong direction?
  • It doesn't pay to invest in technology without a plan.
  • the industry of failing to look before it leaps into technology upgrades, charging ahead without a precise objective.
    • lvela051
       
      Very important to note.
  • ...8 more annotations...
  • Kapur said that as the industry works to fix its growing list of tech limitations, organizations within hospitality continue to attempt to disrupt or reset aspects of the customer journey, creating more problems.
  • what is a brand’s vision
  • Today, however, she sees and industry that is hungry to innovate while simultaneously lacking direction.
  • hotel companies began innovating around the time point-of-sale systems were introduced, but once these organizations reached critical mass, innovation decelerated.
  • Kapur argued that technology must enable a property to offer a powerful stay experience every time, eventually delivering the guest to your brand.
    • lvela051
       
      What Kapur argues that technology should do.
  • Barry Goldstein, chief commercial officer at Wyndham Hotels & Resorts, agreed with Kapur, but said hotels have limited chances to win guests over because of the heavy levels of competition found in the market.
    • lvela051
       
      More concerned of competition that brand vision.
  • The word “integration” has been the refrain of the conference, with nearly every company discussing ways to work in tandem with others to smooth out hotel operations and create an exciting guest experience.
  • Hoteliers were made for hospitality, not things like website management, and with tech manufacturers able to focus on their zone of genius, hotels are able to specialize.
  •  
    The article talking maining about the issues that companies have in investing into technology without having a set plan. Mr. Estis-Green, among others, stated that they see an industry that is very innovative but lacking direction in its approach to investing in the correct technology. The main issue is seems to follow throughout the article is that these companies are following trends instead of figuring out if said technology would mix well with the brand vision. A first, the implementation of technology within a business was used more as a tactic but it has become more popular that is has changed the way the guest experiences service at a hotel, from POS systems to a front desk check in. It's driving the way hotels run their business. I think that the biggest issue with investing in technology is controlling the way its used within a hotel. With technology becoming bigger and being implemented within larger hotel brands, it is changing the service experience which affects the loyalty of a guests. Taking that into consideration, I think that it causes internal competition within the vision that a hotel original sets out to provide and what other hoteliers are doing to gain that loyalty. As mentioned in the article, i think that the best way to have a vision and trend coincide is to find a way to personalize it to its convenience and effectiveness.
sliu043

eMarketing Do's and Don'ts | Top Stories | Hospitality Magazine (HT) - 0 views

  • The Do's: 1. Follow the rules of spam filters and the Can Spam Act, which applies to all marketing and promotional e-mail distribution, except transactional e-mails such as confirmations or thank-you correspondence.
  • 2. Play the keyword game.
  • The Don'ts: 1. Avoid messaging without a purpose. Inundating customer mailboxes with generic and too-frequent messaging dilutes the program's value and can be interpreted as spam. Sign-ups without an explanation of the program garner little participation.
  • ...6 more annotations...
  • 4. Tap e-marketing's immediacy. Among the benefits of e-marketing is the ability to cut the cycle time from offer to close.
  • 3. Make your customers feel special.
  • 2. Don't overwhelm.
  • 3. Don't overuse e-coupons, an easy temptation to succumb to when early campaigns boost business. Making a special offer in every e-mail trains guests to wait for the offer and diminishes the full price value of the product. Narrow e-mail coupons to a few per year and always for a particular reason, and make it time sensitive, tied to a purchase and personalized.
  • 4. Don't forget surveys.
  • Surveys can also flesh out information garnered through earlier solicitations, making for a richer database to mine for marketing uses (and avoiding appearing too intrusive at sign-up).
  •  
    In this article, the author pointed out that nowadays the Internet has played a prominent role in the lives of most consumers, so hotels and restaurants must make the good use of the Internet to send their marketing messages. Through the e-marketing experiences, the article has introduced some best practices as well as tactics for hotels and restaurants, revealing a list of e-marketing Do's and Don'ts. In one word, the author believed that striking the right tone is essential in an e-marketing program. Be clear, straightforward, respectful and fun to score points with recipients, and offer things they value: exclusivity and meaningful rewards. In addition, use database analysis tools to make the most of the data collected: to cater to specific groups and even personalize messages.
anonymous

6 New Event Technology Ideas Our Experts Are Excited About | ITA Group - 1 views

  • 6 New Event Technology Ideas Our Experts Are Excited About
  • 1. Capturing More Data Means a More Personal Experience
  • the true power of acting on attendee data can start to reverberate in the event industry.
  • ...15 more annotations...
  • he more data we can capture about the event attendees from the moment they heard of the event, to registration all the way through post event, the better we can create an event that meets and exceeds their needs. In turn, we can sort event data and pick out 'ideal attendees' to pinpoint what marketing tactics were most effective and how we can better attract those types of attendees to future events.”
  • radio-frequency identification (RFID) technology, which can unlock immense value to the attendee, organizer, as well as company
  • Attendees can scan their band to check into the event, reducing check-in times to mere seconds; they can use their band to indicate interest in a product or service, engage in social activations (an RFID-activated ‘virtual bartender’ is my personal favorite), purchase items or scan into sessions, to name a few things. Organizers can conserve show floor space
  • RFID bands can help to uncover incredibly meaningful data about how attendees felt about not only the conference itself, but all kinds of small aspects of the conference. These can be useful for conference follow-up, but can even be used in real-time by integrating back to Salesforce or Marketo.”
  • Reality Bites: Looking to Virtual and Augmented Reality
  • We take an already cool experience and elevate it by making an attendee feel like they are actually in a virtual environment. Pushing the boundaries even further, we take the concept and capabilities of VR and combine it with physical elements to create a completely new environmental experience in real-time—which now brings in the AR component.
  • AI will allow us to understand our participants and tailor their event experience to meet their needs and surprise and delight them with experiences that are tailored specific to them. I'm also excited to see how facial recognition will impact our experiences onsite.
  • New advances in event technology stand to transform every element of the industry from snoresville to spectacular. The result will be truly personalized, deeply interactive and intensely meaningful brand experiences for each and every attendee
  • to pinpoint what marketing tactics were most effective and how we can better attract those types of attendees to future events.”
  • radio-frequency identification (RFID)
  • RFID bands can help to uncover incredibly meaningful data about how attendees felt about not only the conference itself, but all kinds of small aspects of the conference. These can be useful for conference follow-up, but can even be used in real-time by integrating back to Salesforce or Marketo.”
  • This ‘real’ or ‘near time’ data, coupled with marketing automation capabilities, is pushing the envelope on how organizations are able to track ROI. At the same time, niche technology providers are becoming more mature.
  • RFID bands can help to uncover incredibly meaningful data about how attendees felt about not only the conference itself, but all kinds of small aspects of the conference.
  • We no longer have to jump over the hurdle of how to deliver content to our audience.
  • mpact how we manage our attendees and the interaction we have with them from event check-in to monitoring interactions at the event, but also helps with safety and security at our events.”
  •  
    This article shared the technological advances that are being made in the event industry to create better experiences for attendees. Through the use of AI, Virtual reality, and RFID, companies are utilizing these tools to collect data at events. The information collected allows companies to improve their events, narrow down their target markets, and get a feel for what their attendees are actually interested in.
  •  
    Marketing and Networking capabilities and issues between companies throughout organizations.
  •  
    Very interesting read! I am doing my research paper on electronic bands. It is really cool to see how the industry is integrating this technology to make the guests experience more enjoyable.
wanqian

Enhancing SMTEs' business performance through the Internet and e‐learning pla... - 2 views

In Europ, SMTEs is a critical and majority group in hospitality industry as different as Asia or America. With 99 per cent of businesses classified as small and medium‐sized tourist enterprises (SM...

e-business tourism e-learning SMTEs

started by wanqian on 04 Sep 17 no follow-up yet
jorgeegutivav

Meeting the Threat in 2019: Cybersecurity for the Hospitality Sector | Modern Restauran... - 0 views

  • With a reputation as less well guarded than similar institutions, hospitality companies are a popular target for cyberattacks.
  • Experts warn other hackers, like those working for a nation-state, could exploit hospitality breaches like Marriott’s to acquire details on the travel and spending habits of espionage targets, like CEOs and diplomats.
  • permeable security in the hospitality sector threatens consumer privacy, shareholder value, and national security.
  • ...15 more annotations...
  • many hospitality companies are reconsidering their cybersecurity infrastructure. However, industry specific challenges like high employee turnover continue to expose the sector.[6]Additionally, even by adopting cutting-edge cybersecurity technologies, the important question of strategic implementation remains.
  • Are newly introduced technologies simply bolstering traditional methods of cybersecurity, or are they being used for methods of cybersecurity that are new and innovative, instead of simply faster or more efficient versions of the same product?
  • Traditional cybersecurity approaches are focused on reporting about intrusions after the fact, in what is known as an “incident response.”
  • Regardless of how they gain access, once an attacker is discovered, the forensics about the attack, including basic information known as Indicators of Compromise (IOCs) like IP addresses, domain names, or malware hashes, are shared across the cybersecurity community. These IOCs are then used broadly to thwart future attacks. 
  • The problems with this approach are twofold:
  • someone has to be a victim first so that IOCs can be derived and shared with others; additionally, blocking IOCs has a very short half-life.
  • All an adversary has to do is come from a new IP address or recompile their malware so that it has a new hash value (both of which are extremely trivial) and their attacks will sail through defenses that depend on IOCs.
  • As hackers repeatedly gain access to valuable systems and data using the same methods, cybersecurity teams continue to chase after them to secure compromised systems.
  • Very little cybersecurity effort is put towards addressing the methods used by adversaries; instead, security teams are locked in a pattern of waiting for inevitable attacks, trying to minimize the damage they cause, ensuring that remediation occurs as quickly as possible, and blocking only exactly identical attacks.
  • Incident response only helps prevent attacks that exactly replicate past ones.
  • a more proactive, sophisticated approach is needed. It will need to be designed to successfully recognize adversary methodology (and all the manners in which an adversary attempts to obfuscate their methodology) before attacks occur and at a meaningful scale.
  • Instead of seeking discrete, static IoCs based solely on what has already occurred, proactive cybersecurity analysts can instead use the intelligence they have derived about adversaries’ methodologies – commonly referred to as tactics, techniques, and procedures (TTP). 
  • From these TTPs, analysts can identify the general form and components of an adversary campaign. In addition, they can determine abstract indicators like how the adversary is attempting to hide his actions. 
  •  A proactive cybersecurity tool would be able to recognize possible adversary TTPs and indicators that describe a threat (or threatening behavior) in general terms. The system would then act on any traffic which met this pattern before it reaches inside a network, as the attack occurs, and do so in a way invisible to adversaries.
  • Using this basic model, a cybersecurity tool could truly prevent common exploits before they were executed, and could even predict and protect against future, not yet seen exploits.
  •  
    In the wake of the Marriott International cyberattack, the article presents the issues with the current issues in the methodology of cybersecurity; first explaining the data of how popular they are in the hospitality industry, and what it means for the industry, before going into the process of how a cyberattack happens and the measures taken to prevent it. Traditional cybersecurity is one of an "incident response" which can only be implemented once a cyberattack occurs and can only prevent it temporarily as a hacker can do similar tasks with different IP addresses and new malware. In order to circumvent this failure of cybersecurity, the article offers a new method in which TTPs (tactics, techniques, and procedures), are used to identify certain components of a hacker and identify how they would carry out an attack, before acting on it before the attack would "reach the network".
  •  
    This article discusses one of the largest fears of most hospitality firms, and that is keeping their client's personal information private. Most large companies in this industry have become giant data centers for the personal information of millions of people. Breaches of this type of information place the lives of many people at stake. For example, Marriott International had a security breach of over half a billion of its clients which began in 2014 and was not detected until September of this year. Keeping an individual's information away from malignant forces is just plain business sense and any more attacks of this manner will severely hurt the reputation of the business experiencing it.
zihanwang

What is event management software and do you really need it? - Lead Forensics - 2 views

  • The benefits of using event management software It can make your life easier The main benefit of using such solutions is that they can help you maximize registrations, while minimizing the resources that may otherwise have been needed. Once you’ve set up an event on your chosen software, then you should just be able to press go and let it get on with things – leaving you to concentrate on promoting the event. If you’re running multiple events, or a regularly occurring event, then this can be particularly useful. Saves time needed for manual processing Good solutions will help you automate most processes. They will offer features like registration tracking, payment processing and also tools that can aid audience engagement. You’ll be able to grab a quick snapshot of what’s happening, who’s registered, who’s paid, who went on to attend and more. Plus, you’ll have an easy way to track how much money an event is bringing into the business. It will save time for your communication sequences too. With just a few clicks you should be able to send out tailored emails, including “thank you for attending” messages to those that made it and “sorry we missed you” to those who didn’t. Aids professionalism and the overall experience A further benefit is that it can make the management of the process feel that much more professional. The whole experience should run more smoothly. Nothing should be missed, which you can easily risk with a manual system. The payment of any monies can also be managed more easily and you’ll have the ability to manage multiple events easily. Can help increase engagement Engagement is at the heart of all marketing. It needs to start long before an event takes place and be supported and encouraged during and after. Good event management software will provide tools to aid participant communication at all stages. It will also give you the ability to see and analyze the global picture of your overall engagement levels. Supports targeted activity Marketing is at its strongest and most effective when it is highly targeted and tailored to an individual. (The key principal of account based marketing). You can use specialist solutions to tailor your event and all associated marketing activity. For example, by creating unique guest lists and email lists, and sending out targeted emails to those different attendees using certain parameters. A holistic approach Overall, event management software can act as a hub, holding together all elements of the event’s process. It can help keep everything connected, from the agenda, to speakers, any sponsors and the attendees.
    • zeyupu
       
      Benefits of event registration system.
  • Hosting an event can be an effective marketing tactic for any business. They take considerable time and effort to carry out, but get it right and you could soon see a strong return on your investment. The power of an event – especially a highly tailored in-person one – lies in the opportunity it provides to get face-to-face with a target audience.
  • For businesses across all industries and sectors, they offer a way to showcase your knowledge, position yourself as an expert and generate a source of positive content. Importantly, they can help you move leads along the sales path and closer to making a purchase.
  • ...13 more annotations...
  • The overall aim of any B2B marketing event must always be to give a good impression of the business and what it may be like to work with you.
  • It can make your life easier
  • Saves time needed for manual processing
  • Aids professionalism and the overall experience
  • Can help increase engagement
  • Support channels
  • You can use specialist solutions to tailor your event and all associated marketing activity.
  • A holistic approach
  • Lack of design options
  • he easiest way to check this out is to see if you can have a free trial or comprehensive demo.
  • Price
  • Supports targeted activity
  • Using new software will often mean a steep learning curve, so see what is offered to help you through that process and beyond.
  •  
    Hosting an event can be an effective marketing tactic for any business. They take considerable time and effort to carry out, but get it right and you could soon see a strong return on your investment. The power of an event - especially a highly tailored in-person one - lies in the opportunity it provides to get face-to-face with a target audience.
  •  
    This article goes over the benefits of using event management, which includes making your life easier, saves the time needed for manual processing, aids professionalism and the overall experience, and can help increase engagement. Furthermore, it also supports targeted activity and a holistic approach. Some cons would be a lack of design options, the price, and support channels. The top solutions would be implementing Splash, Eventbrite, Bizzabo, EventPro, Cvent, Etouches, and XING Events
  •  
    This article introduce several pros and cons of event management software. On the one hands, the event management can make the process easier for business and consumers and it can help increase engagement. But, on the other hands, The price can also vary greatly, with the most sophisticated and popular systems generally coming at the highest cost and some vendors offer a free version of their software with limited features. To recoup costs, these vendors may run advertisements on event sign-up pages or charge registrants a booking fee. That may influence users experience.
1 - 20 of 86 Next › Last »
Showing 20 items per page