Skip to main content

Home/ Hospitality Technology/ Group items matching "were" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
kdomi006

Food for thought: How Airbnb markets to hosts, The rising costs of advertising and more | By Martin Soler - Hospitality Net - 1 views

  •  
    Advertising costs were mentioned a few times within this article. With that being said, a few ad channels are becoming limited. For the most part, advertising is currently being done through Google or forms of social media. Chatbot has really become a priority for investors. What this article is trying to find out if having chats means faster/more reservations or reduces time spent with customers over the phone. Getting rid of a phone conversation seems like a plus because most consumers prefer to text or email rather than talking on the phone. China has developed ways for consumers to pay using their smartphones (like Applepay). So far it's been a success in China, being that it's cheaper for merchants and a convenience for guests. Unlike China, Applepay still hasn't been a huge success. Air BnB has been successful in marketing tactics in this generation. This is due to the fact that they change methods/tactics and increased efficiency. Although it may cost more, it is more effective when it comes to more revenue.
emilywest5

Developing an eMarketing model for tourism and hospitality: a keyword analysis - ProQuest - 0 views

  • Advances in IT have prompted the hospitality and tourism industries to move in a new direction, i.e. internet marketing or eMarketing (Leung et al., 2015)
  • On the other hand, from the customer perspective, tourism and hospitality are an information-intensive consumption experience because a customer might make considerable efforts to collect information and understand the image of a travel destination before making a purchase decision (Kim and Law, 2015). In this regard, search engines and social media are two of most fundamental information sources for making such decisions (Xiang and Gretzel, 2010). With their information-sharing capability, social media empower customers, granting them a “democratic consumption culture” by reducing information asymmetry and increasing their bargaining power (Leung et al., 2013). The pervasiveness and powerful computational capability of mobile technology make it possible for tourists to easily access information, book online services or even make impromptu purchases (Kim and Law, 2015). Apparently, the tourism and hospitality industries have been facing a revolution that has arisen largely because of IT turbulence (Piccoli, 2008).
  • Studies suggest that IT plays a prominent role in the tourism and hospitality industries, and it will be imperative, and indeed beneficial, for tourism and hospitality practitioners and scholars to keep abreast of all the advances in IT
  • ...11 more annotations...
  • Correspondingly, the frontiers of IT-related research will not only benefit the innovation and encroachment of the industry but also support managers, researchers, policymakers and other interested audiences in understanding the progress of developing trends and themes in the context of IT development
  • Among these analyzes, the keyword co-occurrence network particularly aims to construct knowledge, as the keywords of an article are anchored by the authors to distill the core concepts of a paper. Keywords generally represent the main idea of a research paper and express authors’ understandings of their work within the thematic context of their research domains (Ali et al., 2019). Keywords are regarded as one of the most meaningful indicators of an article’s content (Weismayer and Pezenka, 2017). Although keywords indicate the topic area and key variables/theories used in a study, they do not convey key findings such as the causal relationship between two keywords. Nevertheless, a group of keywords from the same domain creates an intellectual knowledge map of that realm. A knowledge map is generated from keywords according to the following steps
  • Keywords are collected from journal articles. A network of these keywords is built. A knowledge map connects the same keywords in different articles. A complete knowledge map is formed when all articles undergo the previous three steps.
  • eMarketing Capability As this study’s model of eMarketing capabilities is a major contribution and these capabilities play a critical role in marketing performance, future studies can investigate the antecedents/consequences of eMarketing capability, develop a scale or investigate the formation process of this construct. Future studies might validate the proposed model-based either on a single eMarketing capability or on multiple eMarketing capabilities. Empirical studies could benefit the development of research concerning eMarketing tourism and hospitality.
  • 3. Methods3.1 Data collection
  • 3.2 Data processing
  • 3.3 Analysis process and tools
  • Emerging Digital Technologies The purpose of this study is aimed at understanding the impact of IT on tourism and hospitality. However, as IT continues to evolve and advance, and as new technologies often alter customers’ behavior, as well as firms’ marketing strategies, it is necessary to pay attention to the impact of new digital technologies on focal fields. Specifically, it could be interesting and promising to explore the impact and role of forthcoming digital technologies in different eras, specifically, artificial intelligence, machine leaning, AR, virtual reality (VR), mixed reality (MR), chatbots, robotics, blockchain, 5 G or the internet of things (Park et al., 2018; Tung and Au, 2018).
  • As the database contains journals from various domains, this study first identified the target journals by using the keywords “travel,” “tourism” and “hospitality,” identifying 24 journals. Next, as these journals are affiliated with different publishers, the keywords “IT*,” “IS” and “technology*” were input to search ICT-related articles on the official website of each journal from its first issue to April 2020.
  • Customer Equity and Engagement Value Customer equity and engagement value are two of the crucial variables that require a better understanding in the eMarketing tourism and hospitality research. With the application and support of advanced IT and quantitative mathematical models, it will be valuable for future work to explore all aspects of the factors that influence customer experiences over time to synergize and maximize customer equity and CEV for DMOs or hotels.
  • Marketing Performance Apart from loyalty, other marketing performance indicators including financial and non-financial ones are encouraged to be developed. Such work will contribute to both the tourism and hospitality academia and allow industrial managers to link financial performance with innovative IT in terms of profit, sales revenue or cash flow. Moreover, assessing non-financial marketing performance (market share, quality of services or CEV) will help researchers and managers better understand the predictors of future financial performance than traditional accounting measures have in the past, and it should also supplement financial indicators in internal accounting systems (Ittner and Larcker, 1998). Finally, it will be contributory to develop a combined indicator linking financial and non-financial measures. Table 4 summarizes the overview of future research avenues.
  •  
    This article is about how hospitality and tourism have been reshaped through IT, eMarketing and how it has helped prove sales, information, made destinations more popular and also help travelers plan. eMarketing also is a massive platform for word of mouth. This study also shows what helped eMarketing become what it is. When certain things are typed into search bars, this data is collected and used for eMakreting and to target specific groups of people.
cleon087

Green IT | Green Hotelier - 2 views

  • Reducing energy, emissions and waste are concepts that have been around for many years, but one area that is often overlooked is information technology (IT).
  • it was estimated that 360 million computers were manufactured.
  • quiring over 10 times its weight in fossil fuels to make.
    • cleon087
       
      Computers waste a lot of energy and parts
  • ...30 more annotations...
  • 22kg of toxic chemicals, 240kg of fossil fuels and 1,500 kg of water.
  • consuming 15% of the total electricity used in offices
  • 50 million tons of e-waste was generated worldwide, but only 13% was recycled. US Environmental Protection Agency
  • Reusing working computers is up to 20 times more energy-efficient than recycling them
  • hich utilises the naturally cool environment below ground to reduce power consumption, and increase energy efficiency.
  • o date, more than 28,761 IT assets have been recycled (waiting for latest stats), which equates to 629,408lbs of e-waste diverted from landfill.
    • cleon087
       
      I wonder where is the recycling actually taking pace
  • Big hotel companies have wised up to the costs involved in operating inefficient hardware and are driving system changes to cut wasteful expenditure.
  • nt. A data centre’s life expectancy is relatively long so it is imperative it is built to the highest standards in terms of efficiency as any excess energy use will lead to significant cost implications over the years.
  • most energy-efficient data centre possible.
  • Get the right equipment.
  • Only get the data storage capacity that is currently required and forecast for the lifespan. Many d
  • Don’t have servers or equipment that will not be used.
  • , such as water cooling.
  • allows a single user to access several physical devices on one terminal. A computing device dedicated to an individual member of staff or allocated for one software application is highly inefficient and expensive. Virtualisation consolidates resources, requiring less power and cooling.
  • cloud computing
    • cleon087
       
      We discussed this in class about the benefits of it.
  • e. Once you know what’s using the power, focus on why and whether it’s possible to reduce consumption. Spotlight on Fairmont Hotels & Resorts - T
  • into account not only the initial outlay cost of hardware, but also the running costs.
    • cleon087
       
      It's not only important to know the start up cost but what it cost to maintain it.
  • e up to 30% more energy, making it significantly more expensive when looking at the total cost of running that appliance during its lifespan.
    • cleon087
       
      It doesn't seem obvious but getting something cheaper will cost heavy in the long term.
  • investigate options to upgrade with the latest energy-efficient components to extend appliances’ working life and efficiency
  • Green labels
  • Data centres last 30-odd years and you can’t go back in and fix them, so they need to be efficient. Over time, this saves money as they run efficiently. Servers have to be Energy Star-compliant or I won’t even talk to vendors.”
  • is to reuse, not recycle
  • and flat screens often being replaced well before the end of their shelf life and ending up in landfill, it’s imperative that the most is made of these materials by reusing them productively.
    • cleon087
       
      Normally people just upgrade because something new came out instead of using it until it stops working.
  • Dumping e-waste on developing countries was until recently commonplace, and it has caused huge environmental problems and harm to human health in countries such as Ghana and China. But new legislation, including the EU WEEE Directive and the 2010 US Responsible Electronics Recycling Act, has stopped countries from being able to export e-waste.
  • dopted a scheme where the cost of recycling an electronic item is included in the purchase price. In Switzerland, they’ve been able to return all electronic waste to their place of purchase since 2005, and in the European Union, Taiwan, South Korea and Japan manufacturers must by law recycle 75% of the e-waste they produce.
  • Smaller, more efficient processors.
  • which have greater memory storage capacity while requiring less energy and space. They are due to be on the shelf in about three years.
  • pecialist data centre design.
  • all sizes are starting to view IT outsourcing as a viable option to gain flexibility and reduce short-term costs and increase transparency of cost structures and processes.
  • 6. Water cooling
  •  
    Green IT is an aspect of technology that many people do even consider when thinking about sustainability. According to Computer Aid International, "The production of a computer requires 22kg of toxic chemicals, 240kg of fossil fuels and 1,500 kg of water. 80% of life-cycle energy use is accounted for before we even switch a PC on for the first time." This statistic alone should be enough for us to take action. Marriott has started taking action, however. They created an underground data center where the power consumption goes down and efficiency goes up. Cloud computing is also a massive help due to the fact that the physical software wont be on the desktop computers or laptops being operated so the power consumption will be lowered there as well.
  •  
    Green IT is an aspect of technology that many people do even consider when thinking about sustainability. According to Computer Aid International, "The production of a computer requires 22kg of toxic chemicals, 240kg of fossil fuels and 1,500 kg of water. 80% of life-cycle energy use is accounted for before we even switch a PC on for the first time." This statistic alone should be enough for us to take action. Marriott has started taking action, however. They created an underground data center where the power consumption goes down and efficiency goes up. Cloud computing is also a massive help due to the fact that the physical software wont be on the desktop computers or laptops being operated so the power consumption will be lowered there as well.
  •  
    This article focuses on the importance of having green IT in business. It shows example of other hotels that have already adopted green IT. Not only this but it offers tips for businesses that are looking to adopt green it. It highlights the issue of recycling computers instead of reusing it . They recommend to use the appliance until it doesn't work.
Yue Li (3011472)

The Fairmont Hotel checks in a green IT strategy - Page 1 - Green IT - 3 views

  •  
    Usually most of computers in the hotel won`t close include in the guest room and work station. It will make huge of waste. With this green IT strategy , hotel will reduce energy consumption and save tones of CO2 annually. Fairmont's strategy is a "great example" of where businesses can hit next
  • ...2 more comments...
  •  
    It is important that hotel company focus on develop green IT which can play a big part in a corporate social responsibility. At the same time, it is an important part of the strategy to ensure the power down by essentially forcing. Hotel should have back up plan for some unexpected thing happen.
  •  
    That's a good green IT strategy that The Fairmont is applying. I just read an article about the green practices that The Double Tree is applying and although they were very good and interesting the article do not mention anything about a green IT strategy.
  •  
    It is amazing how even a small initiative of shutting down work stations after an hour inactivity can be this impactful generating such savings. My only question is that the fact that Fairmount is a global company can they really have a centralized center controlling all work stations? In any case this initiative is driven by their corporate leader and is a powerful message in terms of social responsibility.
  •  
    Fairmont Hotels & Resorts announced a comprehensive green IT strategy by addressing technology infrastructure and IT operations for all 56 of its hotel properties worldwide. A key part of its green initiatives is a central-managed power-down schedule that all of its internal desktop will be shut down one hour of their activities. One of the spokesmen said that this green IT approach is suitable for hotels that do not traditionally have a data center. He also pointed out that this new green IT approach is easily applied in North America and part of the Europe, whereas a little harder in Asian countries because of the different standard that they use. So what they are working on is to getting everyone to understand its value and set up international standards.
kyleemcroberts

5 Key Lessons Learned from Critical Infrastructure Cyber Attacks - 0 views

  • 5 Key Lessons Learned from Critical Infrastructure Cyber Attacks
  • Cyber criminals are highly motivated, creative, and nimble
  • Consider the rise of cryptojacking, which uses mining malware to hijack computers to mine cryptocurrency.
  • ...8 more annotations...
  • Don't be complacent — limit Internet access points with silos.
  • The attackers were just trying to look for unused processing power that they could use for their benefit."
  • finding the time to consistently audit and always be improving security is critical too
  • Keeping the critical infrastructure efficient and effective is challenging enough.
  • Train your humans.
  • This example underlines the importance of educating employees to always be vigilant and raising awareness of potential threats.
  • Stay current.
  • Concerns that new operating systems or software updates might destabilize crucial infrastructure can inhibit the best practice of always updating.
  •  
    There have been many cyber-attacks in many different nations and that is for many different reasons, such as outdated, human error, and all software being in one vulnerable spot. It is important to always update your programs, use cloud computing, and to educate your personal on all cyber-attacks. It is also important for your teams to understand the "why" behind updating and cloud computing and this is to always keep an upper edge on cyber-attacks. Cyber criminals are always changing their ideas and new ways to take over networks and workday and night to find someone to slip up and it can cause the complete down fall of a company or nation.
deranique

Experts at Davos 2023 sound the alarm on cybersecurity | World Economic Forum - 0 views

  • 2023 will be a consequential year for cybersecurity.
  • "There's a gathering cyber storm,"
  • "This storm is brewing, and it's really hard to anticipate just how bad that will be."
  • ...17 more annotations...
  • cyberattacks such as phishing, ransomware and distributed denial-of-service (DDoS) attacks are on the rise.
  • Cloudflare
  • a major US cybersecurity firm that provides protection services for over 30% of Fortune 500 companies
  • "There's been an enormous amount of insecurity around the world,"
  • "I think 2023 is gonna be a busy year in terms of cyber attacks."
  • Experts warned that cyberattacks are increasing in sophistication and frequency.
  • “This is a global threat, and it calls for a global response,”
  • “This is a global threat, and it calls for a global response and enhanced and coordinated action,” Jürgen Stock, the Secretary-General of the International Criminal Police Organization (INTERPOL),
  • “The key to winning the battle against cybercrime is, of course, to work together to make it a priority across the geopolitical fault lines.”
  • This concern has been raised particularly around critical infrastructure sectors like energy, public transportation and manufacturing. SecurityScorecard, a US cybersecurity rating and analysis firm, reported recently that 48% of critical manufacturing companies surveyed were at significant risk of a cyber breach.
  • “Vulnerabilities within the critical manufacturing sector haven’t gone unnoticed by cybercriminals either,” said Aleksandr Yampolskiy, SecurityScorecard's CEO.
  • The Forum's report also notes that the potential targets for cyberattacks are increasing. Today, targets include not only government agencies or major corporations, but largely any organization that handles consumer data—no matter how small.
  • There is no such thing as a hundred percent security. It's about resilience in the face of insecurity.”
  • Consumers, too, need to increase their cybersecurity awareness in 2023, experts say.
  • As more things get connected to the internet there's just more risk. ”— Matthew Prince, Cloudflare CEO
  • Zero Trust approach to cybersecurity, which creates a framework that eliminates implicit trust and ensures that any user—even those who are supposed to be inside an organization's network—is authenticated and validated at every turn.
mmoutsatsos

Digital Transformation in the Hospitality Industry | Boston Hospitality Review - 0 views

  • We are now experiencing the fourth industrial revolution, a period marked by emerging technologies such as artificial intelligence, robotics, virtual reality, the Internet of Things, and fifth-generation wireless technology.
  • The recent Covid-19 pandemic has accelerated this digital transformation resulting in a widening technology-mediated customer experience.
  • Service robots are “system-based autonomous and adaptable interfaces that interact, communicate, and deliver service to an organization’s customer” (Wirtz et al., 2018, p. 109).
  • ...46 more annotations...
  • The core interactive and communicative features differentiate service robots from other self-service machines, which result in unprecedented human-technology interactions in the hospitality industry.
  • he service production process, disinfection robots, which emit UV light to kill viruses and bacteria, were announced to be used in airports and hotels worldwide to ensure a safe and clean environment (Greg, 2020).
  • The robots drive around autonomously in high-touch public areas and select rooms at the hotel, removing all airborne viruses and bacteria. As an extension of the hotel’s “SmartStaySafety” operation, the use of UVD robots not only provides a safe environment but also assures guests that they are being protected. 
  • In
  • the service delivery process, service robots assist frontline staff in a sequence of service encounters. For instance, the robot concierges assist employees with guest greetings upon arrival, transporting luggage, guiding guests, and delivering room service.
  • service robots can effectively respond and interact with guests, even in multiple languages. 
  • While robots make significant contributions to operational efficiency, they also raise concerns.
  • Service robots are still novel in hospitality. Their ability to cope with unexpected, dynamic conditions remains to be fully explored.
  • If guests do not follow the pre-set route, service robots may fail to respond, which can lead to a service failure.
  • AI-powered online chatbots are also employed to provide swift answers to customers via live chats.
  • provide customers with immediate responses 24 hours a day, significantly improving customer engagement.
  • customers believed VR simulations would be the best tool for hospitality operators to create a compelling customer experience.
  • VR can make a huge difference in a customer’s booking stage.
  • Through the digitally accommodated environment, customers can have a much clearer sense of what they are expecting, thus attracting more prospective customers.
  • VR application is the virtual tour video,
  • This not only offers customers a chance to experience prior to booking, but also allows the hospitality business to benefit from the “try before you buy” marketing strategy. 
  • Unlike VR, which puts customers in a completely virtual environment, augmented reality (AR) is about enhancing the physical environment and the experience of exploring one’s surroundings in real-time.
  • The current applications of AR in hospitality are largely for entertainment and practical purposes.
  • One example is the Best Western Hotel Group’s experiment with AR and Disney stars.
  • Another application of AR is indoor navigation
  • Internet of Things (IoT) refers to “an ever-growing network of connected devices which communicate with a central server as well as with each other” (Car et al., 2019, p. 163).
  • IoT provides integrated services, such as automated door locks, light switches, electric blinds, and voice-assistant devices, which are connected on a network.
  • These allow customers to control or monitor their devices from a central server, such as a mobile phone or a tablet. 
  • For example, customers can use their mobile phones for self-check-in and check-out.
  • Rooms also become “smart” with the help of IoT, which is also called the “connected room” at Hilton hotels.
  • Customers can also use voice-controlled assistants, for example, the Amazon Alexa, to control those in-room features, and order food or drinks, which can be delivered by autonomous delivery robots.
  • In addition, devices, such as luggage carts with GPS function and sensors in the parking lot, can help customers to locate their luggage and cars. Thus, IoT helps improve service processes and makes customer experiences smoother.
  • It obtains real-time data through continuous tracking from various devices, as well as a collection of customer information that was previously unavailable, such as preferences, routines, and habits (Marek & Woźniczka, 2017).
  • there are several emerging issues that hospitality practitioners must take into consideration when embracing digital technologies, which include security, privacy, costs, and human touch in hospitality. 
  • IoT with locational information can send real-time personalized recommendations to customers based on their stored preferences.
  • IoT can collect customers’ preferences for in-room features, and the data can then be used to customize the room settings for their next stay.
  • Security is a fundamental issue in digital transformation in any industry, including hospitality.
  • Also, t
  • he broad connection of various devices brings vulnerability to digital networks.
  • Thus,
  • hospitality managers must prepare for security implications of digital transformation, which can be accomplished by adopting high-security technologies to reduce software vulnerabilities, building resources to mitigate risk of cyber-attacks, and training employees on cyber-attack prevention.
  • Privacy is another important factor as highly personalized services rely on storing and tracking customer preferences and behavior through digital technologies.
  • a transparent, strict, and clear privacy policy clarifying what data can be collected and shared, and who can own the data, is necessary.
  • Another challenge is associated with the high costs of employing these digital technologies.
  • For small businesses, using digital technologies in their daily operations may require significant upfront investments.
  • it is becoming critical for hospitality businesses to consider what digital technologies would most benefit their business.
  • for small hospitality businesses, they need to prioritize what works best for them when adopting digital technologies.
  • the paradox between digital convenience and in-person experience.
  • hospitality, particularly in fine dining restaurants, customer-staff interaction is highly valued by customers.
  • it is important for hospitality businesses to strike a balance between digital convenience and in-person experiences
  • Key considerations include judging what services cannot be replaced by digital tools, preservation of the choice for customers to decide between digital or human services to maximize customer experience, and incorporation of interactive digital features in the process.
  •  
    This article talks about the current applications of 3 innovative technologies and how they are used in the hospitality industry.
rosedelice

Simplify with Tech - Best Strategy for Revenue Managers 2021 - Atomize - 0 views

  • Analytics and automation are nothing new for revenue managers but recent advancements in tech take these areas to new heights. Only a short while back predictive analytics, forward-looking data and live insights were still futuristic dreams. Today they’re a reality. That’s a good thing for revenue managers, especially in the upcoming ramp-up phase, these new capabilities are crucial to making the most of unpredictable markets. 
  • The ideal solution here is for the Cluster Revenue Manager to use a system that automates data collection. First, this saves you time gathering information. Second, it gives you immediate access to the data you need to shape strategies and make recommendations for all hotels in your cluster.
  • Using an automated system to collect live market and competitor data solves this problem. For the best results, pick a business intelligence (BI) solution that provides live, on-demand reporting. This will give you access to the latest numbers whenever you need them, otherwise, you’ll lose time again on updating old reports. 
  • ...1 more annotation...
  • Revenue Managers have the reputation for working with number-focused, unwieldy reports. Those can be hard to follow for department heads less familiar with the topic. As a result, you’ll get a lot of questions and have to spend time you don’t have to defend your strategy. 
  •  
    Automation helps Revenue Managers in many ways beyond just reducing manual work. It makes data-driven pricing easier and reveals emerging market trends in their earliest stages. It decrease the time you spend on back-and-forth communication and discussion.
sydneywolfson

What is Contact Tracing? - 0 views

  • Contact tracing is a public health practice that health departments use to identify and notify people who have been exposed to someone with an infectious disease.
  • Public health workers reach out to these exposed people to tell them that they've been in close contact with an infected person and to give them information and support to help them keep themselves and their loved ones safe.
  • People who have tested positive for COVID-19 infection receive a phone call or a short survey by text or email from the health department, asking them who they may have exposed while they were contagious
  • ...2 more annotations...
  • Your identity and health information that you provide to a contact tracer is always kept confidential. It will not be shared with anyone who may have been exposed. 
  • Anyone who was within 6 feet (2 meters) of an infected person for a total of 15 minutes or more within 24 hours is considered to be a "close contact."
  •  
    This article talks contact tracing with Covid-19. Health care works will contact anyone that person has been in contact with via phone call or text to let them know about the exposure.
ahyla001

WiFi Proximity Marketing: Strategies and how they work | Purple - 3 views

  • time comm
  • QR (Quick Response) codesWiFi (Wireless Fidelity)NFC (Near Field Communication)RFID (Radio-frequency identification)GeofencingBLE (Bluetooth Low Energy) beacons
  • Besides the end-users mobile device, a collection of location-based technologies (LBS) is needed to successfully utilize proximity marketing.
  • ...7 more annotations...
  • The downside to using the QR code strategy is getting users to make the initial interaction and additional print material may be necessary. 
  • Businesses can utilize their free WiFi offering as a new channel for marketing directly to customers.
  • NFC tag uses don’t stop at the point of sale system, in fact, the knowledge gained from each purchase and interaction further improves the insights businesses have, meaning over time, customer segmentation and messaging become more focussed.
  • The definition of geofencing in proximity marketing is defined as the ability of a company to micro-target people based on the places they go.
  • For example, a sportswear brand may want to target those at a sports event and so will draw their geometric radius around the venue of the event. Patrons that attend with their devices ‘location-enabled sensors’ settings turned on are allowing their GPS to share their location data with their service provider (SP).
  • The convenience store chain attached BLE beacons to trolleys, and baskets to track customer movements when entering, leaving, and moving around its stores. With the movable and planted roof beacons in place, Nisa was able to accurately collect a large pool of geometric insights that fed into one central cloud for further analysis. From these gatherings, Nisa will have been able to understand customer dwell times and see which product aisles were most popular.
  • Geo-loyalty is a method of utilizing proximity marketing methods to boost customer loyalty and drive app usage for higher conversion and engagement rates.
  •  
    This article is about Proximity Marketing and the many different specific ways it may be applied. These applications include: QR Codes, WiFi, NFC, RFID, Geofencing, and BLE Beacons. In all of these cases, it is vital to proximity marketing that there be an end-user mobile device (such as an iPhone or Android) as well as location-based technologies. We are all fairly familiar with QR codes as those have become widely used during the pandemic. What we may not have considered though, is how logging into a WiFi gives a lot of information about you to the business, as well as a future means of communicating with you (assuming you made an account and/or gave them important information such as an email address). Geofencing is also really cool because it allows companies to set up a virtual boundary that collects data from mobile devices that pass through that boundary. This allows a business to truly know what kinds of consumers go in and out of whatever establishment the geofence outlines.
« First ‹ Previous 781 - 790 of 790
Showing 20 items per page