Skip to main content

Home/ Hospitality Technology/ Group items matching "University" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
bench7628

Are Waiters In Danger Of Being Replaced With Tablets And Robots? - iReTron Blog - 0 views

    • bench7628
       
      This article point the positive and the negative effects of robot waters and tablets in the restaurant industry. There is a high demand for eMenu and robots in the restaurant industry in the country like China.
  • A new report from Cornell University claims that table top technology actually benefits customers at full-service casual dining chains. By monitoring one chain restaurant’s service over the course of two Fridays and two Saturdays, research showed that table turnover rates improved and customer spending increased when a table top-placed tablet was used for ordering and/or settling the bill.
  • When you think about it, there can be advantages to robot waiters. They won’t spit in your salad when they get mad at you, and they certainly won’t give you a bad attitude. They probably won’t need to be tipped. But don’t people go to restaurants for human interaction?
  • ...1 more annotation...
  • Perhaps people who attend fancy restaurants won’t like the new technology completely taking over their experience. And then there are people who are completely sick and tired of technology taking over every other profession, including education and banking. But the replacement of waiters with tablets and (possibly) robots is certainly going to happen whether they like it or not.
nicolasdepinto

The Sinclair Hotel is the First in the World to Power Itself With This New Technology | Architectural Digest - 2 views

  •  
    The article discusses how a soon to be opened 164 rooms property the Sinclair Hotel in Fort Worth Texas, will become one of the world most green-friendly property thanks to being the first one to implement power over Ethernet (POE) technology. Ethernet cables are traditionally used for landline phones and routers connections, but POE lets network cables carry electrical power, allowing the hotel to control and power its lights, window shades, smart mirrors, minibars, and back-up battery generator from a computer network; which reduces energy consumption and labor costs. This technology is universal and in theory could be applied anywhere, reshaping the way we design electrical systems.
  •  
    This article was very interesting! The Sinclair Hotel has been around since 1930, now they are working to revamp the building to make it power its own technology through Ethernet. This will effectively prepare the hotel for any outages on the property and notifications of issues with technology.
dsada005

Hotel Security: Preserving Hospitality While Protecting Guests | Allied Universal - 0 views

  • How can hoteliers ensure that their property provides as secure an environment as possible, while maintaining friendly customer service? 
  • “It takes 20 years to build a reputation and five minutes to ruin it. If you think about that, you’ll do things differently.”
  • A single act of crime on your property could diminish your brand.
  • ...3 more annotations...
  • Hotels need to partner with an experienced physical security provider, and ensure that the entire staff understands the need to keep security top of mind - always. 
  • Maintain security-minded customer service  Review key card access  Establish evergreen background screening protocol  Control after-hours access  Assess location and local crime statistics  Train security officers to welcome and protect  Bolster public/private initiatives  Maintain emergency response plans  Commit to ongoing training
  • The open environment fostered by hotels is welcoming to guests and visitors but, unfortunately, also creates vulnerabilities that must be addressed. Ensuring that all public spaces are continually monitored by staff and security personnel is crucial in maintaining a hospitable environment. 
  •  
    This article emphasizes the importance of security in any hotel. "It takes 20 years to build a reputation and five minutes to ruin it." This quote stuck to me as you can spend all your life working on a brand, for it to be destroyed due to a lack of safety measures. When going to a hotel, or traveling in general, a guests main concern is their safety. However, too many safety measures can actually have an adverse effect on guests, making them wonder why there are so many safety measures and if they are actually safe in this hotel. For example, going through a metal detector in an airport is accepted to be normal, however, if a hotel had such, I am sure this would have most of the guests feeling unsure about staying in the hotel. Too much security and you are deemed as unsafe, and too little security can ruin your brand if something were to happen, therefore, a good balance of security is necessary. Some security measures in this article are: key card access, evergreen background screening, after-hours access, assessing local crime statistics, security officers must be properly trained to welcome and protect, and emergency response plans must be practiced.
lclar060

The E-Waste Land - Washington Square: The Stories of San Jose State University - 0 views

  •  
    E-waste is an electronic product of a consumer or business which (actual or seemingly) has reached the end of its lifespan. Depending on city regulations and provisions, e-waste can be quite costly if not properly disposed. For instance, hazardous chemicals can seep out of used phones or tablets and pass through our water tables. California, the first US state to have enacted a Electronic Waste Recycling Act in 2003, implemented a legislation to reduce hazardous substance in newly built electronics and a fee for the disposal of larger electronics. This has proven successful in reducing E-waste thus far. Another solution to the E-waste dilemma is to create a market for re-purchase of such materials. Products that are "Designed for the Environment" are to be marketed as preferred and created as such. Therefore, consumers, environmentalists and entrepreneurs reclaim pollution and turn it into profit.
yuqiongliang

Advantages And Disadvantages of HRIS in Human Resource Management - 0 views

  • This is not an HR system…it is a management system and is used specifically to support management decision making .
  • It merges HRM as a discipline and in particular its basic HR activities and processes with the information technology field, whereas the planning and programming of dataprocessing systems evolved into standardised routines and packages of enterprise resource planning (ERP) software.
  • these ERP systems have their origin on software that integrates information from different applications into one universal database.
  • ...9 more annotations...
  • HRIS Advantages
  • HRIS Disadvantages
  • Many companies have seen a need to transform the way Human Resource operations are performed in order to keep up with new technology and increasing numbers of employees.
  • HRIS systems may track performance reviews and performance issues as part of its management of employee information. Higher-grade systems may also conduct mathematical functions related to this data in order to rate employees based on performance abilities.
  • All HRIS software maintains a database of information on employees past and present
  • Most HRIS software does at least some basic form of payroll processing.
  • HRIS systems that conduct payroll operations also usually manage benefits information
  • HRIS systems generally include the capability of tracking employee work-time
  • HRIS systems come in a variety of software configurations.
  •  
    HRIS is used for employment actions such as applicant tracking, performance management, attendance, compensation and benefits management, work force analyses, and scheduling.
ruchit0622

Chinese tourist town uses face recognition as an entry pass | New Scientist - 1 views

  • Who needs tickets when you have a face? From today, the ticketed tourist town of Wuzhen in China is using face-recognition technology to identify people staying in its hotels and to act as their entry pass through the gates of the attraction.
  • It was only a matter of time before face-recognition software was rolled out on this scale,” says Mark Nixon at the University of Southampton, UK.  It’s more convenient to use your face than tickets, he says, so it’s likely that the technology will soon be seen elsewhere.
  • The system is first being used to track the 5000 people per day staying in hotels in Wuzhen, who make up around 15 to 20 per cent of the town’s total visitors
  • ...1 more annotation...
  • you have to present your passport and the software determines whether the person standing in front of the camera matches that identity.
  •  
    This is one of the astonishing software I have come across. The Chinese tourist town in Wuzhen, have started using this software in many of its hotels, even at the port of entry on the airport. The software senses the face of the individual and authenticates it with the proof identification shown by the individual. The software has huge amount of data stored inside it, this makes the check in procedure easier for the hotel. The software recognizes the faces of the individual accurately, research shows that the software so far has an accuracy of 99.8%. This software is about to substitute the finger print software, which was time consuming. The software is believed to be more secure and safe than the finger printing.
jmore044

A Necessary Evil: A Look at The OTAs - Hotelier Magazine - 0 views

  • So, what’s the issue? For one, the whopping commissions the massive web-based entities take, routinely in the 20- to 30-per-cent range
  • Hotels won’t give them any parameters at all, he points out, and a different pricing model will have to emerge. “They won’t necessarily take commission or such, but they might charge you just to drive people to your site. It’s a scary idea.
  • The net result, says Estis Green, whose company conducts hotel data analytics, is that hotels can’t really compete on price alone anymore. It’s why, in today’s new reality, competition is a game played with other factors, including value-added services, rates based on multiple nights’ occupancy or other inspired — even desperate — offers devised by hoteliers.
  • ...5 more annotations...
  • The ultimate trick to navigating the new landscape is for hoteliers to gain a better understanding of their customers, and to apply that knowledge in a way that’s mindful of the distribution channels that deliver them.
  • Consider also the slew of limitations OTAs impose on their partner hotels regarding details such as the cutoff point at which unsold inventory is restored to the property for its own sales efforts. And their very presence irks a lot of hoteliers, who grumble that they’ve lost control of their own assets, a reality made even more bitter because they invited the snakes into their own meadow. “In my humble opinion,” sighs Jeff Froehlich, director of Sales and Marketing at Vancouver’s Shangri-La Hotel, “Hotels created the monsters that are OTAs.”
  • Certainly OTAs are a high-cost channel, but every channel has fees, and the potential in any market is different based on those channels. An independent hotel on the beach is probably using an OTA more than a branded five-star urban hotel that has its own loyalty program.
  • The optimal channel is one that leads directly to the hotel itself. The dollars spent by guests who book through a hotel’s website are pocketed by the hotel. To that end, operators might improve the look of their websites, include better content, post quality photos and generally ensure the site is superior to the competition. Additionally, they might spend some time contemplating value-adds: including free breakfasts, complimentary room upgrades and late check-ins. Loyalty programs also serve as powerful anchors for an increasing number of hotels. When someone buys a room through an OTA, he doesn’t enjoy the benefit of added points to his standings with the property.
  • Online travel agents are evil, Froehlich says, but necessary. “There’s no point trying to put the monster back in the box.” And no one is disputing OTAs’ right to real estate in the hotel universe. The notion that OTAs have grown too big for their britches notwithstanding, says Le Saint Sulpice’s Di Re, doesn’t mean hoteliers are talking divorce. “We have no choice,” he shrugs, conceding the fact the online agents have massive marketing power. “You’re damned if you do, damned if you don’t.”
vickychapas2021

Proximity Marketing: Often Creepy, but It Doesn't Have to Be: Center for Digital Ethics & Policy: Loyola University Chicago - 0 views

  • That night at home, you get an email from the department store. “Still thinking about those shoes?” it asks. “Buy them now!”
  • proximity marketing is delivered via beacons placed strategically throughout a store that use Bluetooth to communicate with smartphones in their range
  • stores can catch up by providing some of the perks of online shopping in person,
  • ...16 more annotations...
  • Beacons can also help shoppers navigate a big store
  • beacon communication
  • often connected to an app
  • , which may gather even richer data, such as a customer’s product preferences, demographic information and purchase history, particularly if the app is hooked up to mobile pay.
  • customers now have access to a map that shows their location within a Target store
  • the state of Illinois proposed a bill that will make it illegal for companies to “collect, use, store, or disclose geolocation information
  • from a location-based application
  • Those who do want the discounts and the conveniences that come with location-based marketing should be able to participate knowing that their data and privacy are safe and respected.
  • displaying in-store signage notifying shoppers that their location data is being collected,
  • And there will always be companies that ignore guidelines
  • , and even break laws.
  • an Uber update surreptitiously removed an option that allowed users to opt out of location tracking when they were not using the app.
  • Instead, users had to sign on for tracking “always” or “never.”
  • they were also forced to sign on to tracking for up to five minutes after they had completed their ride and left the vehicle.
  • It took nine months for Uber to listen to their users. This August, the company finally announced it would stop tracking the location of its users when they were not using the app.
  • Target’s privacy notice is currently 4,359 words and the top of the page reads, “We may change or add to this privacy policy, so we encourage you to review it periodically.”
  •  
    This article mentions the many benefits and consequences of proximity marketing. For instance, there are policies regarding allowing access to one's location that many users are unaware of. Uber for many months allowed the drivers to still have the user's location even after a couple of minutes of dropping them off. They changed this months later, but these kinds of things coming to light makes customers want to leave their location off. Proximity marketing is great for learning more about who shops at our businesses and even to entice the consumer to shop more frequently, but many people would prefer to avoid it.
danakissane01

Simpler E-Waste Recycling Method Might Be Greener, Too | Inside Science - 0 views

  • Simpler E-Waste Recycling Method Might Be Greener, Too
  • The new approach can separate different metals in electronic waste using only air and high temperatures.
  • It's estimated that more than 50% of critical materials in electronics -- such as gold or rare earth metals -- end up in landfills.
  • ...3 more annotations...
  • In a paper published in the journal Materials Horizons in March, materials scientist Martin Thuo and his collaborators at Iowa State University demonstrated a new method of extracting valuable metals from recycled electronics: one that requires only air and relatively low temperatures of 500-700 degrees Fahrenheit (260-370 degrees Celsius). 
  • A strength of this new method is its tunability, allowing different metals to be extracted from a sample one by one. The balance of air and temperature controls which component in the waste reacts fastest. Once the most reactive component is entirely oxidized, it is separated from the rest of the sample, and the process continues with the next reactive component.
  • The tunability of the process also means that the waste must be "profiled" first, to determine the quantity of each component and design the air and temperature changes accordingly. Thuo said fine-tuning these profiles, as well as characterizing the method's environmental friendliness and cost, will be a priority as his team begins to commercialize the technology. 
  •  
    A new method that might help E-waste recycling become more green and safe for the environment.
yoevelyn

PMS integration: Why it's key to an effective hotel business - 0 views

  • Competition is hot in the online booking space
    • yoevelyn
       
      So, having an integrated PMS may go beyond conserving resources and into the realm of marketing. To stay competitive, a hotel property may need to list its bookings in different outlets, and a well integrated PMS can help managers make rooms available in real time by using data pushed through their PMS's.
  • Your hotel property management system should effectively be the lifeblood of your property; controlling, automating, and accelerating a huge range of operational procedures.
    • yoevelyn
       
      This article suggests that a good PMS should be the center of your hotel universe. Allowing you to integrate all parts of the hotel operation.
demax85

Safety & Security Tips for Hotel Management | Chron.com - 1 views

  • Hotel crime may be even higher than the statistics show, because most hotel guests report the crime to the hotel, but not to the police, and hotel managers might not report the crime to law enforcement.
  • Employees to
  • Train
  • ...3 more annotations...
  • now Safety Procedures
  • Keep Your Guests Informed
  • For example, if you have an intelligent access control system, each guest needs to know that their key card grants them entry to the pool, gym and any other areas that are solely for hotel patrons. It's also important that a hotel guest does not hold the door open for a person who's directly behind him, as this individual might not be a paid hotel guest. If all hotel staff knows the script word for word, this procedure becomes an integral part of hotel check-in. That way, all guests know they've been apprised of their responsibilities in keeping themselves and their valuables safe.
  •  
    Good Evening, This article is about hotel security with tips and suggestions how guest can remain more secure without impeding there vacations. Like Professor Joseph said during his class time when he's on vacation he doesn't watch the immediate surroundings. .Most time crimes are not reported by the guest to local jurisdiction they mostly go to security team and hotel managers who might not want to tarnish there reputation. I remember watching Law and Order SVU quite often most university ploy this same tactic of not reporting crimes. Lastly cyber security is most important to be fixed hotel guest don't wanna have to worry about there personal information getting out on the dark web.
  •  
    This article talks about some security measures hotels can take to tighten security. Controlled employee access areas or controlled guest areas where the room key is needed to get into locations for guests is one way to control unwanted guests. Face recognition systems is a tool to identify guests and others. The use of the mobile device as a room key works as a way to help with security as guests usually have their cellphones on them most of the time. Training employees on security measures can help fill in the gaps of loop holes in the security system.
dominiquewalker

Hotel Computer Network » BNG Hotel Management Kolkata - 1 views

  • A computer network or data network is a telecommunications network which allows for computer systems to alternate data. In computer networks, networked computing instruments pass knowledge to each other along network links
  • In 1969, the university of California at la, the Stanford research Institute, the tuition of California at Santa Barbara and the institution of Utah had been related as part of the evolved study initiatives company network (ARPANET) task. It is this network that developed to come to be what we now call the web.
  • Two such instruments are said to be networked collectively when one gadget is able to alternate knowledge with the opposite device, whether or not or no longer they have an instantaneous connection to each other.
  • ...1 more annotation...
  • Facilitate communique via electronic mail, video conferencing, immediate messaging, etc.
  •  
    This article discusses "Hotel Computer Networks". The author keeps information brief but informative.Highlights include, explaining the point of a computer network and how such communication is made possible. "Hotel Computer Networks are used to: Facilitate communique via electronic mail, video conferencing, immediate messaging, etc." The article concludes by highlighting the various varieties of computer network's used in hotels i.e. Local Area Networks, Personal Area Networks and Campus Networks.
khadija2050

MGM Resorts falls victim to data breach | PhocusWire - 1 views

  • MGM Resorts International is the latest travel brand to suffer a security attack involving customer details, in an incident that took place last summer.
  • Details of the incident were uncovered last week by ZDNet, which says the personal details of more than 10 million customers were shared on a hacking forum.
  • “unauthorized access to a cloud server.”
  • ...6 more annotations...
  • He adds that companies should also monitor for leaks of the data.
  • a dark web monitoring specialist, says this kind of incident can be avoided by regularly checking who has access to cloud-based servers:
  • “confident that no financial, payment card or password data was involved in this matter."
  • “This incident also highlights the importance of speed when mitigating digital risk; watermarking data with unique synthetic identities can enable organizations to detect these threats immediately and be the first to find out if their data is available online, before someone else does. Setting up email listeners for these watermark identities can detect a breach before the data is shared online, if the hacker is testing for valid addresses.”
  • advises that the same security levels for data on premise need to be in place for what is stored in the cloud.
  • It’s a near-universal challenge for enterprises: the move to hybrid environments and more complex, fragmented networks makes it even harder to keep control. Without consistent policies you can pretty soon have a tangle of security gaps and compliance violation
  •  
    MGM Resorts falls victim to data breach last summer, more than 10 million customers' information were leaked out. It was took place through "unauthorized access to a cloud server." However, specialist said this breach can be avoided by regularly checking and monitoring. Also, specialist advised that MGM also need to take same security levels for data on premise in their could.
  •  
    It was reported that MGM Resorts fell victim to a data breach on a cloud server but not much critical guest information was leaked out. Experts said that this kind of breach can be avoided by checking who was able to access the server regularly. Also, the company needs to monitor data to find out the leakage earlier than anyone else. Monitoring the data stored on the cloud should also be as important as those stored on-site.
  •  
    the article gives details about a data security breach that the company was a victim of and how information of 10 million customers were shared .
nbakir

'Good Enough' Rules the World - The New York Times - 0 views

  •  
    Technology has become the backbone of today's economy, especially during this pandemic. Technology has become the center of the universe since with the closure of many businesses, and remaining indoors has contributed to people shifting their focus on technology to stay sane and survive (Ovide, 2020). The success of many online platforms during this pandemic like Netflix, Amazon, TikTok has become a worldwide sensation that technology rules the world. This paper will discuss in detail how the aspect of 'Good Enough' contentment in technology leads the world. The article describes how 'good enough' has been embraced, especially in technology, since a company having many small combined Stuff in one platform is more convenient despite them not having something one may need. They have accumulated other Stuff to substitute for that which they cannot offer and package it conveniently and affordably so that it can be useful and a good enough spot to hang out and consume time with (Ovide, 2020). Good enough economy' has contributed immensely to technological growth by creating a balance between content creators and distributors of the information, primarily through the internet, which has become an effective medium in the information distribution-making it easy and available worldwide, as people use it to showcase their talent and share content created during their free time. Companies like Facebook and YouTube have managed to assemble many people since they have a variety of content that, although one content is missing, one can focus attention elsewhere on the pool of the content accessible (Ovide, 2020). In a nutshell, good enough is more appropriate than perfect, which can have extra cost or hard to find. Most companies sell to us what they need us to buy hence keep creating new ideas.
sbarr011

Mobile key: It's the new reality for hotels | Hotel Management - 1 views

  • ” Shedd said. “On average, guests using digital key rate a hotel seven points higher than keycard guests with 84 percent of guests likely to use digital key again. 
  • New technology always takes time to enter the mainstream and mobile key is still on the adoption curve, but reviews among users and hotel satisfaction scores prove out that mobile key is the future
  • “The global demand for digital locks has swamped the manufacturers to the extent the typical wait time to receive new locks is up to 90 days. Challenges still exist around budgets to fund upgrading locks to BLE, but the desire to do so among hotels worldwide seems to be universal.”
  • ...2 more annotations...
  • Remote check-in with mobile keys will allow guests to go straight to [their] room and improve the hotel’s operational efficiency.”
  • The mobile technology used with radio frequency ID electronic locks delivers a more personalized and interactive guest experience—from check-in and informing guests of hotel amenities to securely accessing their room, all via their mobile device,
  •  
    The article titled Mobile Key: It's the new reality for hotels by Esther Hertzfeld, discusses the various aspects of the implementation and utilization of the mobile key technology in hotels. The mobile key technology is a Bluetooth enabled lock that a user can open with their mobile devices. The popularity and demand for mobile key entry in hotels is skyrocketing. However, hotels can't implement them as fast as the guests demand and desire them. It will be easier for hotels that are being built from scratch to integrate the feature than established hotels switching over to this new technology, but I believe they will eventually. In the article it states that guests rate the hotel 7 points higher with mobile key cards. Higher reviewed hotels will bring in more guests thus increasing hotel revenue. The utilization of the mobile room key allows the guest to check in on their phone remotely. Once the guest arrives to the hotel they can go straight up to their room without having to stop at a front desk. This gives the guest a more personalized and efficient experience, which I agree with. In my opinion being able to walk into a hotel and go up immediately to my room is ideal. I have not stayed at a hotel yet that has used the mobile key feature but I imagine it is great. I think all hotels in the future will run on mobile key entry. The article states there will be a learning curve for the guests and staff initially. It will be important to educate guests who don't travel often and guests in general. It stated that some people might feel embarrassed if they don't use the mobile key correctly and need to return to the front desk. That could be very frustrating to some guests who come to their room and then have to go back downstairs to talk to the front desk if something goes wrong. It is also stated that there will be awareness and comfort challenges with the front desk staff. I believe that mobile key entry is the future of hotel technology. It will take
Karyn

Green Chemistry – Electronics TakeBack Coalition - 0 views

  •  
    This article discusses a solution to the toxic chemicals that are used in technological products and its effect on the environment due to lack of recycling and toxicity hazards. The current solution to the hazardous chemicals leaking into the environment and its human rights issues has been a management solution only. Products are made with these chemicals without, possibly for decades, knowing the true harm that coming into contact with them can cause to humans and the environment, so scientists simply try to decipher this and contain the problem. This has led to huge amounts of money trying to clean the damage already done by this tech trash. We are now learning (especially with the rejection of trash from poorer nations), that there needs to be a better solution to this problem. The article points out a plan with a few strategies, but which center more around prevention, than cleaning up after a mess. This is where "green chemistry," comes in. Technological products of all kinds can be redesigned with prevention of toxicity in mind. This has to do with not only using less toxic chemicals, but using chemicals that break down in certain ways, testing new methods to see how they break down before using them, designing safer chemicals, using renewable raw material, design for better energy efficiency, and more. The article states that it is important for the electronics industry to take responsibility and to design with green chemistry. Green chemistry is a very new science, brought about by the realization of the overwhelming issue of toxic tech trash. A smattering of universities are now developing these green chemistry programs, or in the least, requiring chemistry students to take courses on toxicity which were not requirements previously.
  •  
    The hospitality industry can contribute to this movement by recycling hardware, reducing hardware usage, and purchasing technology that becomes developed that is considered to be "green." This way, the industry can produce less waste that is driving this huge international problem.
Rochelle Perez

BBC - Travel - Could carbon-removal tech make travel more sustainable? - 3 views

  • As few as 1% of airline passengers participated in voluntary carbon offsetting before virus-induced travel restrictions took hold, according to The International Air Transport Association (IATA), indicating that purchasing carbon “credits” from your airline or a certified carbon offsetting organisation to compensate for your travel emissions likely wasn’t high on your priority list to begin with.
  • The difficulty in accurately quantifying most carbon-offsetting programmes (it’s difficult to gauge, for example, the volume of emissions you’ll offset by contributing to a clean cookstove project, an energy efficiency initiative typically funded by offsetting organisations) hasn’t helped.
  • Could this be the new carbon offsetting?As permanent carbon removal becomes more accessible to travellers through these two schemes, environmental sociologist and University of Southampton research fellow Dr Roger Tyers, who explored carbon offsetting in his PhD, says it may help to bolster the offset industry.“More measurable offsets like direct air capture (either for permanent removal or for creating alternatives to fossil fuels) could lift standards across the whole offset market,” he said. “They might also help shine a light on cheaper and less effective offset schemes that have dominated the market so far, which are often too good or cheap to be true.”Until carbon removal with permanent storage becomes more financially viable for travellers to adopt, other offset providers perhaps shouldn’t be too worried about losing customers. But the founders of Climeworks and Tomorrow’s Air hope that the need for urgent action on climate action will encourage travellers to incorporate permanent carbon removal into their carbon offsetting strategies sooner rather than later.
  •  
    The article describes the travel industry's attempts at carbon-removal and allowing a way for travelers to feel involved in carbon-offsetting
laboygrisell

Global E-waste Monitor 2020 - 0 views

  • The Global E-waste Monitor is a collaborative effort between the International Telecommunication Union (ITU), the Sustainable Cycles (SCYCLE) Programme currently co-hosted by the United Nations University (UNU) and the United Nations Institute for Training and Research (UNITAR), and the International Solid Waste Association (ISWA).
  • higher levels of disposable incomes, urbanisation, and industrialisation in many developing countries are leading to growing amounts of electrical and electronic equipment (EEE) and, consequently, to greater amounts of e-waste.
  • Toxic and hazardous substances such as mercury, brominated flame-retardants (BFR) or chloroflurocarbons (CFCs) are found in many types of electronic equipment and pose severe risk to human health and the environment if not handled in an environmentally sound manner.
  • ...5 more annotations...
  • predicts global e-waste will reach 74 Mt by 2030,
  • In 2019, only 17.4 per cent of e-waste was officially documented as formally collected and recycled
  • a target to increase the global e-waste recycling rate to 30 per cent by 2023
  • The number of countries that have adopted a national e-waste policy, legislation or regulation has increased from 61 to 78 between 2014 and 2019.
  • TU Member States also set a target to raise the percentage of countries with an e-waste legislation to 50 per cent – or 97 countries - by 2023.
  •  
    This article is very interesting and eye opening. Just the thought that "by 2023" the e-waste will be down is unrealistic. Companies will keep making more products and the e-waste will grow, unless they don't change the materials they use to create that type of technology.
biancafavilli

ECommerce in Hospitality and Tourism Industry - 1 views

  • New technologies are providing different channels for marketing and management that improve the capabilities of society. And computers are providing faster and more reliable processing with lower cost continually.
  • In Hospitality and Tourism industry, hardware, software, information management, and telecommunications systems have allowed for the processing and information flow amongst organizations. The way in which tourism organizations take advantage of IT tools may determine their future success in the marketplace [4]. We consider the importance of the trend of Information Technology by implementing an effective IT system for advertising, distribution, encouragement and co-ordination of the industry. It is important that Hotel Industry take the lead of the emerging technologies to improve management abilities and develop business plans focusing on the most efficient income of delivering value added products to clients.
  • B2C transactions involve business-to-customer interactions.
  • ...27 more annotations...
  • B2B transactions involve business-to-business.
  • B2E transactions involve a business and its employees.
  • C2C transactions involve two or more consumers (customer-to-customer).
  • The industry can make profits to many countries and pull foreign currencies into the country.
  • The travel distribution system is currently facing many changes as online agencies such as Priceline, Travelocity, Expedia, etc. have introduced a way to access travel suppliers directly via the worldwide web. In general, Global Distribution Systems have not shown much of an effort toward targeting on-line customers. As an alternative, Customer Relation Systems have remained trustworthy to their travel agency distributors.
  • The Internet is not the full solution to success in the Hospitality and Tourism industry. However, the Internet is the “overall business answer” across industries
  • The success of the Hospitality and Tourism industry will depend upon the abilities to identify and answer quickly to current and potential customer needs
  • Starwood Hotel Group was standing ahead of other Hotels to offer a online “virtual tours” of its properties. This feature provides a site visit to potential guests without having to travel to each property. And now, many well-known hotels are also providing this promotion feature for stand top of the roles to attract potential customers.
  • Google presented the vision of Internet marketing is likely to grow by 2015. Some of them are worth to be informed and aware about.
  • 50% of ad campaigns will include video ads bought on a cost-per-view basis 50% of ads will be bought using this real-time bidding technology to tailor experiences for different viewers Smartphones / mobile phone will be the number one screen for digital brands to engage users There will be at least 5 metrics that advertisers will regard as more important than the “click” 75% of web ads will be “social” in nature such as facebook. Therefore, Ads will be shared, discussed, subscribed to and recommended Multimedia formats enable great creativity and interaction – these will grow from 6% of display ad impressions to 50%, especially for brand building campaigns Digital display advertising is going to grow to a $50 billion industry This forecast shows that competition to attract potential customers via worldwide web will be more and more drastic.
  • World Tourism Organization (WTO) estimates that over 1.5 billion tourists would take international journeys in the year 2020.
  • Another e-Commerce model such as Auction style-pricing models are becoming customer preference, where the customer are able to control the price of the products and services to be consumed.
  • Airlines have a stronger straight link to customers as they compete directly against travel agents [23]. Furthermore, they could have stronger control over the customers due in part to the e-ticketing. In this respect, online technology has replaced the travel agency by adding value via fare shoppers, promotions, and personalized recommendations
  • Customers are almost guaranteed that they will obtain the best price by negotiating via an online agent such as Priceline. But a shortcoming to all of this is that the customer will not understand all of the normal benefits of air tickets as they are sacrificed via online auction purchases. For example, in many cases the travel ticket does not permit any changes or accrual of or without significant penalty charges.
  • Online companies have more of a chance at success in Hong Kong due to the dense population, strong education systems, high credit card and cell phone usage. This leaves room for the future development of the next Priceline or Travelocity in Asia which could pose a major threat to hospitality & tourism organizations. Based on the high volume cell phone usage in Hong Kong, Mobile commerce should be a new trend on next stage. [29]
  • As low cost computer real-time data, fast speed internet access, voice and video communications become a reality, travel agencies may no longer be needed. On the other hand, the Internet challenge can also mean chance. Hotel owners and operators who understand and master e-commerce or m-commerce challenges will be able to jump ahead of online threats from large players such as Priceline. Otherwise, many will find themselves out of business.
  • Information Technology tools have allowed travel intermediaries to expand their role in the industry by presenting opportunities to venture into other markets on a geographical level.
  • Not only should hoteliers focus on the business traveler, but they should also consider whether there are other types of potential target customers as we may find that both young and older generations were sitting in the Internet shops utilizing online services during their vacation as well.
  • Organizations have to invest in the expertise and equipment (Hardware, Software) for building a strong IT base at first.
  • Internet security has been a major issue surrounding the Internet community.
  • Governments are currently addressing Internet based global commerce by considering rules of conduct, guiding principles, laws and taxation. [*30]
  • Today, hotels are distributing their product via more and more channels. How they keep control of availability and price, maintain a consistent level of customer service, in addition to keep their distribution partners up to date at the same time has becomes a complicated and expensive process.
  • The core transactions of our business involve intimate face-to-face interactions, which have certain limitations in regard to the use of e-commerce in the hospitality industry compared with other enterprises
  • It is important to take a look at how Internet technology will affect the future of the tourism industry. Most IT tools are being utilized
  • The hospitality & tourism internet future suggests a universal system where property management systems will eliminate the need for expensive on-site computer hardware/software.
  • Future success for hospitality & tourism companies depends upon their abilities to identify a target market and the strategic opportunities available for survival and growth.
  • It is crucial for hospitality & tourism organizations to stay on top of the roles of the major online players that are posing a serious threat to the industry such as Travelocity, Priceline, Expedia, Yahoo, etc. Their role in the future of hospitality & tourism marketing is crucial to the survival of Hoteliers.
  •  
    This article highlights the different aspects that e-commerce brings to society. It highlights the many ways that e-commerce has affected the Hospitality Industry and the things that can be done about it, and it also highlights the economical and political impact that e-commerce might have on the future of our society (especially the hospitality industry).
mtedd003

Cyber Security Marketing Tactics That Actually Work - 0 views

  • Whether you want to attribute it to the rise of interconnected devices in the IoT revolution or just the growing instances of cybercrime, the cyber security industry has seen immense growth in recent years and shows no signs of stopping.
  • This should come as no surprise given that the average annual cost of cyberattacks worldwide is about $9.5 million, according to Ponemon Institute.
  • clearly a need for effective cyber security products and services, there are also many solutions on the market, making it more difficult to capture the attention of your target audience.
  • ...22 more annotations...
  • New cyber security companies are popping up all the time in response to the heightened demand. This can make it hard to stand out in the crowd, and it makes it essential for you to communicate what makes your brand different.
  • you also want to be credible.
  • your potential customers need a significant amount of education to understand what threats they face and what solutions they may need.
  • This is especially true given that CEOs and other C-level executives are not as well versed in information security, which can impact a company’s decision to include cyber security as part of their overall preparedness plan.
  • Though there is plenty of evidence pointing to the necessity of cyber security in protecting valuable data, the truth is that many businesses just don’t prioritize cyber security until it is too late.
  • only one in five, or 22% of those surveyed said that they fully incorporate information security into their strategy and planning.
  • data suggests that cyber security marketers must find ways to create a sense of urgency for potential customers
  • Content marketing can help you build credibility while addressing the major challenge of educating your prospects. In order for your content to be effective,
  • ensure that it is unique.
  • Blogs are great for attracting prospects in every stage of the buyer’s journey. Try to create some evergreen blog content that will be universally relevant
  • Offering downloadable content like e-books and whitepapers is also an excellent way to convert your site traffic into leads that you can later nurture.
  • Another aspect of downloadable content that you’ll need to consider is the landing page.
  • case studies are one of the most important tactics for B2B companies.
  • Email Marketing
  • Downloadable content like e-books, case studies, and reports that provide readers with a more in-depth understanding of important cyber security topics. Links to your most recent blog posts talking about recent attacks or security concerns and those that break down complex cyber security topics for a wider reading audience. Video content that emphasizes the importance of cyber security and communicates the value of your company’s offering. A digest of relevant articles from reputable industry publications that helps readers better understand hot topics in cyber security. Monthly offers and sales promotions like a free trail, which can encourage prospects to sign up.
  • Webinars are a great way for cyber security marketers to connect with bottom-of-the-funnel leads.
  • interactive element.
  • Webinars can sometimes be costly to produce. However, as with other parts of your marketing campaign, there is also an opportunity to repurpose your webinar to get more out of this content.
  • Paid campaigns are great at accomplishing two goals – amplifying your content marketing efforts and getting prospects to arrive at your demo request landing page.
  • Don’t exaggerate your solution’s results.
  • Use data in your messaging. 
  • Create an easy-to-navigate library of premium content. 
  •  
    The Cyber-security Market report has predicted worldwide spending on cyber-security will surpass $1 trillion by 2021. This is a result of annual cyber-attacks costing $9.5 million in global damages. The many solutions on the market require cyber-security services to be innovative on how they market. Cyber security companies want to stand out to customers while still remaining credible. Many businesses are also uneducated and/or don't prioritize cyber-security. The use of blogs and downloadable e-books allow marketers to educate while promoting their product. Cyber security marketers have to make sure they have an easy user-interface, use data in messaging, and don't over exaggerate the capabilities of their products.
« First ‹ Previous 81 - 100 of 109 Next ›
Showing 20 items per page